May 15 17:57:31.903164 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 17:57:31.903215 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 17:57:31.903239 kernel: BIOS-provided physical RAM map: May 15 17:57:31.903262 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 17:57:31.903279 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 17:57:31.903296 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 17:57:31.903316 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 15 17:57:31.903334 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 15 17:57:31.903351 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 17:57:31.903367 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 17:57:31.903383 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 15 17:57:31.903400 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 17:57:31.903421 kernel: NX (Execute Disable) protection: active May 15 17:57:31.903437 kernel: SMBIOS 3.0.0 present. May 15 17:57:31.903458 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 15 17:57:31.903476 kernel: Hypervisor detected: KVM May 15 17:57:31.903494 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 17:57:31.903511 kernel: kvm-clock: cpu 0, msr 7619a001, primary cpu clock May 15 17:57:31.903533 kernel: kvm-clock: using sched offset of 4025827786 cycles May 15 17:57:31.903552 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 17:57:31.903571 kernel: tsc: Detected 1996.249 MHz processor May 15 17:57:31.903590 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 17:57:31.903609 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 17:57:31.903628 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 15 17:57:31.903646 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 17:57:31.903665 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 15 17:57:31.903683 kernel: ACPI: Early table checksum verification disabled May 15 17:57:31.903705 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 15 17:57:31.903723 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:57:31.903781 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:57:31.903800 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:57:31.903818 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 15 17:57:31.903837 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:57:31.903855 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:57:31.903874 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 15 17:57:31.903898 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 15 17:57:31.903916 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 15 17:57:31.903934 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 15 17:57:31.903952 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 15 17:57:31.903971 kernel: No NUMA configuration found May 15 17:57:31.903996 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 15 17:57:31.904015 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] May 15 17:57:31.904039 kernel: Zone ranges: May 15 17:57:31.904058 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 17:57:31.904077 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 15 17:57:31.904096 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 15 17:57:31.904115 kernel: Movable zone start for each node May 15 17:57:31.904134 kernel: Early memory node ranges May 15 17:57:31.904153 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 17:57:31.904171 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 15 17:57:31.904195 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 15 17:57:31.904214 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 15 17:57:31.904233 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 17:57:31.904251 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 17:57:31.904271 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 15 17:57:31.904290 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 17:57:31.904309 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 17:57:31.904328 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 17:57:31.904347 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 17:57:31.904371 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 17:57:31.904390 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 17:57:31.904409 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 17:57:31.904428 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 17:57:31.904447 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 17:57:31.904466 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 15 17:57:31.904485 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 15 17:57:31.904503 kernel: Booting paravirtualized kernel on KVM May 15 17:57:31.904523 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 17:57:31.904546 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 15 17:57:31.904565 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 15 17:57:31.904584 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 15 17:57:31.904602 kernel: pcpu-alloc: [0] 0 1 May 15 17:57:31.904621 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 15 17:57:31.904640 kernel: kvm-guest: PV spinlocks disabled, no host support May 15 17:57:31.904659 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 15 17:57:31.904678 kernel: Policy zone: Normal May 15 17:57:31.904701 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 17:57:31.904725 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 17:57:31.909824 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 17:57:31.909847 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 17:57:31.909867 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 17:57:31.909889 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 225236K reserved, 0K cma-reserved) May 15 17:57:31.909909 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 15 17:57:31.909928 kernel: ftrace: allocating 34585 entries in 136 pages May 15 17:57:31.909947 kernel: ftrace: allocated 136 pages with 2 groups May 15 17:57:31.909974 kernel: rcu: Hierarchical RCU implementation. May 15 17:57:31.909995 kernel: rcu: RCU event tracing is enabled. May 15 17:57:31.910014 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 15 17:57:31.910034 kernel: Rude variant of Tasks RCU enabled. May 15 17:57:31.910053 kernel: Tracing variant of Tasks RCU enabled. May 15 17:57:31.910072 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 17:57:31.910091 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 15 17:57:31.910111 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 15 17:57:31.910129 kernel: Console: colour VGA+ 80x25 May 15 17:57:31.910154 kernel: printk: console [tty0] enabled May 15 17:57:31.910172 kernel: printk: console [ttyS0] enabled May 15 17:57:31.910191 kernel: ACPI: Core revision 20210730 May 15 17:57:31.910210 kernel: APIC: Switch to symmetric I/O mode setup May 15 17:57:31.910229 kernel: x2apic enabled May 15 17:57:31.910248 kernel: Switched APIC routing to physical x2apic. May 15 17:57:31.910267 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 17:57:31.910286 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 17:57:31.910305 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 15 17:57:31.910328 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 15 17:57:31.910347 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 15 17:57:31.910366 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 17:57:31.910385 kernel: Spectre V2 : Mitigation: Retpolines May 15 17:57:31.910404 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 17:57:31.910423 kernel: Speculative Store Bypass: Vulnerable May 15 17:57:31.910442 kernel: x86/fpu: x87 FPU will use FXSAVE May 15 17:57:31.910461 kernel: Freeing SMP alternatives memory: 32K May 15 17:57:31.910479 kernel: pid_max: default: 32768 minimum: 301 May 15 17:57:31.910501 kernel: LSM: Security Framework initializing May 15 17:57:31.910519 kernel: SELinux: Initializing. May 15 17:57:31.910538 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 17:57:31.910557 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 17:57:31.910577 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 15 17:57:31.910596 kernel: Performance Events: AMD PMU driver. May 15 17:57:31.910657 kernel: ... version: 0 May 15 17:57:31.910680 kernel: ... bit width: 48 May 15 17:57:31.910699 kernel: ... generic registers: 4 May 15 17:57:31.910719 kernel: ... value mask: 0000ffffffffffff May 15 17:57:31.910767 kernel: ... max period: 00007fffffffffff May 15 17:57:31.910787 kernel: ... fixed-purpose events: 0 May 15 17:57:31.910811 kernel: ... event mask: 000000000000000f May 15 17:57:31.910831 kernel: signal: max sigframe size: 1440 May 15 17:57:31.910850 kernel: rcu: Hierarchical SRCU implementation. May 15 17:57:31.910870 kernel: smp: Bringing up secondary CPUs ... May 15 17:57:31.910890 kernel: x86: Booting SMP configuration: May 15 17:57:31.910913 kernel: .... node #0, CPUs: #1 May 15 17:57:31.910933 kernel: kvm-clock: cpu 1, msr 7619a041, secondary cpu clock May 15 17:57:31.910953 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 15 17:57:31.910973 kernel: smp: Brought up 1 node, 2 CPUs May 15 17:57:31.910993 kernel: smpboot: Max logical packages: 2 May 15 17:57:31.911013 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 15 17:57:31.911032 kernel: devtmpfs: initialized May 15 17:57:31.911052 kernel: x86/mm: Memory block size: 128MB May 15 17:57:31.911072 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 17:57:31.911096 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 15 17:57:31.911116 kernel: pinctrl core: initialized pinctrl subsystem May 15 17:57:31.911136 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 17:57:31.911155 kernel: audit: initializing netlink subsys (disabled) May 15 17:57:31.911175 kernel: audit: type=2000 audit(1747331850.665:1): state=initialized audit_enabled=0 res=1 May 15 17:57:31.911195 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 17:57:31.911215 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 17:57:31.911235 kernel: cpuidle: using governor menu May 15 17:57:31.911254 kernel: ACPI: bus type PCI registered May 15 17:57:31.911273 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 17:57:31.911288 kernel: dca service started, version 1.12.1 May 15 17:57:31.911303 kernel: PCI: Using configuration type 1 for base access May 15 17:57:31.911318 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 17:57:31.911333 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 17:57:31.911348 kernel: ACPI: Added _OSI(Module Device) May 15 17:57:31.911362 kernel: ACPI: Added _OSI(Processor Device) May 15 17:57:31.911377 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 17:57:31.911392 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 17:57:31.911409 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 17:57:31.911424 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 17:57:31.911439 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 17:57:31.911454 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 17:57:31.911468 kernel: ACPI: Interpreter enabled May 15 17:57:31.911483 kernel: ACPI: PM: (supports S0 S3 S5) May 15 17:57:31.911498 kernel: ACPI: Using IOAPIC for interrupt routing May 15 17:57:31.911513 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 17:57:31.911528 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 15 17:57:31.911546 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 17:57:31.911808 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 15 17:57:31.911969 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 15 17:57:31.911993 kernel: acpiphp: Slot [3] registered May 15 17:57:31.912008 kernel: acpiphp: Slot [4] registered May 15 17:57:31.912023 kernel: acpiphp: Slot [5] registered May 15 17:57:31.912038 kernel: acpiphp: Slot [6] registered May 15 17:57:31.912053 kernel: acpiphp: Slot [7] registered May 15 17:57:31.912073 kernel: acpiphp: Slot [8] registered May 15 17:57:31.912088 kernel: acpiphp: Slot [9] registered May 15 17:57:31.912103 kernel: acpiphp: Slot [10] registered May 15 17:57:31.912117 kernel: acpiphp: Slot [11] registered May 15 17:57:31.912132 kernel: acpiphp: Slot [12] registered May 15 17:57:31.912147 kernel: acpiphp: Slot [13] registered May 15 17:57:31.912161 kernel: acpiphp: Slot [14] registered May 15 17:57:31.912176 kernel: acpiphp: Slot [15] registered May 15 17:57:31.912191 kernel: acpiphp: Slot [16] registered May 15 17:57:31.912209 kernel: acpiphp: Slot [17] registered May 15 17:57:31.912224 kernel: acpiphp: Slot [18] registered May 15 17:57:31.912238 kernel: acpiphp: Slot [19] registered May 15 17:57:31.912253 kernel: acpiphp: Slot [20] registered May 15 17:57:31.912267 kernel: acpiphp: Slot [21] registered May 15 17:57:31.912282 kernel: acpiphp: Slot [22] registered May 15 17:57:31.912296 kernel: acpiphp: Slot [23] registered May 15 17:57:31.912311 kernel: acpiphp: Slot [24] registered May 15 17:57:31.912326 kernel: acpiphp: Slot [25] registered May 15 17:57:31.912340 kernel: acpiphp: Slot [26] registered May 15 17:57:31.912358 kernel: acpiphp: Slot [27] registered May 15 17:57:31.912372 kernel: acpiphp: Slot [28] registered May 15 17:57:31.912387 kernel: acpiphp: Slot [29] registered May 15 17:57:31.912402 kernel: acpiphp: Slot [30] registered May 15 17:57:31.912417 kernel: acpiphp: Slot [31] registered May 15 17:57:31.912431 kernel: PCI host bridge to bus 0000:00 May 15 17:57:31.912584 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 17:57:31.912721 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 17:57:31.917856 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 17:57:31.917931 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 17:57:31.918003 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 15 17:57:31.918074 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 17:57:31.918171 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 15 17:57:31.918262 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 15 17:57:31.918357 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 15 17:57:31.918440 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 15 17:57:31.918524 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 15 17:57:31.918605 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 15 17:57:31.918702 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 15 17:57:31.918806 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 15 17:57:31.918893 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 15 17:57:31.918979 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 15 17:57:31.919059 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 15 17:57:31.919154 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 15 17:57:31.919237 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 15 17:57:31.919323 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 15 17:57:31.919406 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 15 17:57:31.919487 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 15 17:57:31.919573 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 17:57:31.919663 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 15 17:57:31.919777 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 15 17:57:31.919863 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 15 17:57:31.919945 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 15 17:57:31.920027 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 15 17:57:31.920115 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 15 17:57:31.920203 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 15 17:57:31.920285 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 15 17:57:31.920366 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 15 17:57:31.920455 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 15 17:57:31.920538 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 15 17:57:31.920620 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 15 17:57:31.920713 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 15 17:57:31.920817 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 15 17:57:31.920901 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 15 17:57:31.920983 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 15 17:57:31.920995 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 17:57:31.921003 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 17:57:31.921012 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 17:57:31.921020 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 17:57:31.921032 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 15 17:57:31.921040 kernel: iommu: Default domain type: Translated May 15 17:57:31.921048 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 17:57:31.921129 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 15 17:57:31.921211 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 17:57:31.921293 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 15 17:57:31.921305 kernel: vgaarb: loaded May 15 17:57:31.921313 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 17:57:31.921322 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 17:57:31.921333 kernel: PTP clock support registered May 15 17:57:31.921341 kernel: PCI: Using ACPI for IRQ routing May 15 17:57:31.921349 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 17:57:31.921357 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 17:57:31.921365 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 15 17:57:31.921373 kernel: clocksource: Switched to clocksource kvm-clock May 15 17:57:31.921381 kernel: VFS: Disk quotas dquot_6.6.0 May 15 17:57:31.921389 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 17:57:31.921397 kernel: pnp: PnP ACPI init May 15 17:57:31.921482 kernel: pnp 00:03: [dma 2] May 15 17:57:31.921495 kernel: pnp: PnP ACPI: found 5 devices May 15 17:57:31.921503 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 17:57:31.921512 kernel: NET: Registered PF_INET protocol family May 15 17:57:31.921520 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 17:57:31.921528 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 17:57:31.921536 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 17:57:31.921545 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 17:57:31.921556 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 17:57:31.921564 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 17:57:31.921572 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 17:57:31.921580 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 17:57:31.921588 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 17:57:31.921596 kernel: NET: Registered PF_XDP protocol family May 15 17:57:31.921668 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 17:57:31.921769 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 17:57:31.921845 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 17:57:31.921921 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 15 17:57:31.921993 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 15 17:57:31.922077 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 15 17:57:31.922161 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 15 17:57:31.922243 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 15 17:57:31.922255 kernel: PCI: CLS 0 bytes, default 64 May 15 17:57:31.922263 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 15 17:57:31.922271 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 15 17:57:31.922283 kernel: Initialise system trusted keyrings May 15 17:57:31.922292 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 17:57:31.922300 kernel: Key type asymmetric registered May 15 17:57:31.922308 kernel: Asymmetric key parser 'x509' registered May 15 17:57:31.922316 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 17:57:31.922324 kernel: io scheduler mq-deadline registered May 15 17:57:31.922332 kernel: io scheduler kyber registered May 15 17:57:31.922340 kernel: io scheduler bfq registered May 15 17:57:31.922348 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 17:57:31.922359 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 15 17:57:31.922367 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 15 17:57:31.922375 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 15 17:57:31.922383 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 15 17:57:31.922391 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 17:57:31.922399 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 17:57:31.922407 kernel: random: crng init done May 15 17:57:31.922416 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 17:57:31.922424 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 17:57:31.922433 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 17:57:31.922442 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 17:57:31.922524 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 17:57:31.922601 kernel: rtc_cmos 00:04: registered as rtc0 May 15 17:57:31.922691 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T17:57:31 UTC (1747331851) May 15 17:57:31.923817 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 15 17:57:31.923833 kernel: NET: Registered PF_INET6 protocol family May 15 17:57:31.923842 kernel: Segment Routing with IPv6 May 15 17:57:31.923854 kernel: In-situ OAM (IOAM) with IPv6 May 15 17:57:31.923862 kernel: NET: Registered PF_PACKET protocol family May 15 17:57:31.923870 kernel: Key type dns_resolver registered May 15 17:57:31.923878 kernel: IPI shorthand broadcast: enabled May 15 17:57:31.923886 kernel: sched_clock: Marking stable (850095001, 177202631)->(1100033703, -72736071) May 15 17:57:31.923894 kernel: registered taskstats version 1 May 15 17:57:31.923903 kernel: Loading compiled-in X.509 certificates May 15 17:57:31.923911 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 17:57:31.923919 kernel: Key type .fscrypt registered May 15 17:57:31.923929 kernel: Key type fscrypt-provisioning registered May 15 17:57:31.923937 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 17:57:31.923945 kernel: ima: Allocated hash algorithm: sha1 May 15 17:57:31.923953 kernel: ima: No architecture policies found May 15 17:57:31.923961 kernel: clk: Disabling unused clocks May 15 17:57:31.923969 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 17:57:31.923977 kernel: Write protecting the kernel read-only data: 28672k May 15 17:57:31.923985 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 17:57:31.923995 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 17:57:31.924003 kernel: Run /init as init process May 15 17:57:31.924011 kernel: with arguments: May 15 17:57:31.924018 kernel: /init May 15 17:57:31.924026 kernel: with environment: May 15 17:57:31.924034 kernel: HOME=/ May 15 17:57:31.924042 kernel: TERM=linux May 15 17:57:31.924050 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 17:57:31.924061 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 17:57:31.924073 systemd[1]: Detected virtualization kvm. May 15 17:57:31.924082 systemd[1]: Detected architecture x86-64. May 15 17:57:31.924091 systemd[1]: Running in initrd. May 15 17:57:31.924100 systemd[1]: No hostname configured, using default hostname. May 15 17:57:31.924108 systemd[1]: Hostname set to . May 15 17:57:31.924117 systemd[1]: Initializing machine ID from VM UUID. May 15 17:57:31.924126 systemd[1]: Queued start job for default target initrd.target. May 15 17:57:31.924136 systemd[1]: Started systemd-ask-password-console.path. May 15 17:57:31.924145 systemd[1]: Reached target cryptsetup.target. May 15 17:57:31.924153 systemd[1]: Reached target paths.target. May 15 17:57:31.924162 systemd[1]: Reached target slices.target. May 15 17:57:31.924170 systemd[1]: Reached target swap.target. May 15 17:57:31.924179 systemd[1]: Reached target timers.target. May 15 17:57:31.924187 systemd[1]: Listening on iscsid.socket. May 15 17:57:31.924196 systemd[1]: Listening on iscsiuio.socket. May 15 17:57:31.924207 systemd[1]: Listening on systemd-journald-audit.socket. May 15 17:57:31.924223 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 17:57:31.924233 systemd[1]: Listening on systemd-journald.socket. May 15 17:57:31.924242 systemd[1]: Listening on systemd-networkd.socket. May 15 17:57:31.924251 systemd[1]: Listening on systemd-udevd-control.socket. May 15 17:57:31.924260 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 17:57:31.924270 systemd[1]: Reached target sockets.target. May 15 17:57:31.924279 systemd[1]: Starting kmod-static-nodes.service... May 15 17:57:31.924288 systemd[1]: Finished network-cleanup.service. May 15 17:57:31.924297 systemd[1]: Starting systemd-fsck-usr.service... May 15 17:57:31.924306 systemd[1]: Starting systemd-journald.service... May 15 17:57:31.924315 systemd[1]: Starting systemd-modules-load.service... May 15 17:57:31.924323 systemd[1]: Starting systemd-resolved.service... May 15 17:57:31.924332 systemd[1]: Starting systemd-vconsole-setup.service... May 15 17:57:31.924341 systemd[1]: Finished kmod-static-nodes.service. May 15 17:57:31.924351 systemd[1]: Finished systemd-fsck-usr.service. May 15 17:57:31.924363 systemd-journald[186]: Journal started May 15 17:57:31.924404 systemd-journald[186]: Runtime Journal (/run/log/journal/4faad29f390a40ad9461e2e9a2a51a0d) is 8.0M, max 78.4M, 70.4M free. May 15 17:57:31.888761 systemd-modules-load[187]: Inserted module 'overlay' May 15 17:57:31.934512 systemd-resolved[188]: Positive Trust Anchors: May 15 17:57:31.958505 systemd[1]: Started systemd-journald.service. May 15 17:57:31.958527 kernel: audit: type=1130 audit(1747331851.947:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.958546 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 17:57:31.958558 kernel: Bridge firewalling registered May 15 17:57:31.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.934522 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 17:57:31.964136 kernel: audit: type=1130 audit(1747331851.958:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.934558 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 17:57:31.971076 kernel: audit: type=1130 audit(1747331851.963:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.937893 systemd-resolved[188]: Defaulting to hostname 'linux'. May 15 17:57:31.976766 kernel: audit: type=1130 audit(1747331851.970:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.958875 systemd-modules-load[187]: Inserted module 'br_netfilter' May 15 17:57:31.959183 systemd[1]: Started systemd-resolved.service. May 15 17:57:31.993269 kernel: audit: type=1130 audit(1747331851.985:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:31.964848 systemd[1]: Finished systemd-vconsole-setup.service. May 15 17:57:31.971727 systemd[1]: Reached target nss-lookup.target. May 15 17:57:31.978842 systemd[1]: Starting dracut-cmdline-ask.service... May 15 17:57:31.979812 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 17:57:31.985991 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 17:57:32.006327 kernel: SCSI subsystem initialized May 15 17:57:32.006359 kernel: audit: type=1130 audit(1747331852.001:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.001418 systemd[1]: Finished dracut-cmdline-ask.service. May 15 17:57:32.007194 systemd[1]: Starting dracut-cmdline.service... May 15 17:57:32.017325 dracut-cmdline[203]: dracut-dracut-053 May 15 17:57:32.020768 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 17:57:32.027760 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 17:57:32.027787 kernel: device-mapper: uevent: version 1.0.3 May 15 17:57:32.029759 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 17:57:32.034889 systemd-modules-load[187]: Inserted module 'dm_multipath' May 15 17:57:32.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.035675 systemd[1]: Finished systemd-modules-load.service. May 15 17:57:32.041183 kernel: audit: type=1130 audit(1747331852.035:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.041711 systemd[1]: Starting systemd-sysctl.service... May 15 17:57:32.049480 systemd[1]: Finished systemd-sysctl.service. May 15 17:57:32.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.055766 kernel: audit: type=1130 audit(1747331852.050:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.098786 kernel: Loading iSCSI transport class v2.0-870. May 15 17:57:32.119041 kernel: iscsi: registered transport (tcp) May 15 17:57:32.145087 kernel: iscsi: registered transport (qla4xxx) May 15 17:57:32.145157 kernel: QLogic iSCSI HBA Driver May 15 17:57:32.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.196598 systemd[1]: Finished dracut-cmdline.service. May 15 17:57:32.204497 kernel: audit: type=1130 audit(1747331852.197:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.199647 systemd[1]: Starting dracut-pre-udev.service... May 15 17:57:32.296846 kernel: raid6: sse2x4 gen() 5856 MB/s May 15 17:57:32.313832 kernel: raid6: sse2x4 xor() 6735 MB/s May 15 17:57:32.331834 kernel: raid6: sse2x2 gen() 14731 MB/s May 15 17:57:32.348830 kernel: raid6: sse2x2 xor() 8840 MB/s May 15 17:57:32.367833 kernel: raid6: sse2x1 gen() 11433 MB/s May 15 17:57:32.384830 kernel: raid6: sse2x1 xor() 6892 MB/s May 15 17:57:32.384888 kernel: raid6: using algorithm sse2x2 gen() 14731 MB/s May 15 17:57:32.387316 kernel: raid6: .... xor() 8840 MB/s, rmw enabled May 15 17:57:32.387374 kernel: raid6: using ssse3x2 recovery algorithm May 15 17:57:32.405787 kernel: xor: measuring software checksum speed May 15 17:57:32.405846 kernel: prefetch64-sse : 16829 MB/sec May 15 17:57:32.408174 kernel: generic_sse : 11460 MB/sec May 15 17:57:32.408212 kernel: xor: using function: prefetch64-sse (16829 MB/sec) May 15 17:57:32.522796 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 17:57:32.538531 systemd[1]: Finished dracut-pre-udev.service. May 15 17:57:32.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.539000 audit: BPF prog-id=7 op=LOAD May 15 17:57:32.540000 audit: BPF prog-id=8 op=LOAD May 15 17:57:32.541821 systemd[1]: Starting systemd-udevd.service... May 15 17:57:32.555004 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 15 17:57:32.559540 systemd[1]: Started systemd-udevd.service. May 15 17:57:32.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.567323 systemd[1]: Starting dracut-pre-trigger.service... May 15 17:57:32.592839 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 15 17:57:32.637832 systemd[1]: Finished dracut-pre-trigger.service. May 15 17:57:32.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.639164 systemd[1]: Starting systemd-udev-trigger.service... May 15 17:57:32.699461 systemd[1]: Finished systemd-udev-trigger.service. May 15 17:57:32.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:32.768787 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 15 17:57:32.805192 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 17:57:32.805214 kernel: GPT:17805311 != 20971519 May 15 17:57:32.805225 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 17:57:32.805235 kernel: GPT:17805311 != 20971519 May 15 17:57:32.805245 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 17:57:32.805262 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 17:57:32.805273 kernel: libata version 3.00 loaded. May 15 17:57:32.808751 kernel: ata_piix 0000:00:01.1: version 2.13 May 15 17:57:32.809475 kernel: scsi host0: ata_piix May 15 17:57:32.809593 kernel: scsi host1: ata_piix May 15 17:57:32.809693 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 15 17:57:32.809709 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 15 17:57:32.831750 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (454) May 15 17:57:32.835465 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 17:57:32.886510 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 17:57:32.890446 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 17:57:32.893565 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 17:57:32.894127 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 17:57:32.896102 systemd[1]: Starting disk-uuid.service... May 15 17:57:32.907615 disk-uuid[471]: Primary Header is updated. May 15 17:57:32.907615 disk-uuid[471]: Secondary Entries is updated. May 15 17:57:32.907615 disk-uuid[471]: Secondary Header is updated. May 15 17:57:32.917763 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 17:57:32.921756 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 17:57:33.940810 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 17:57:33.941234 disk-uuid[472]: The operation has completed successfully. May 15 17:57:34.008417 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 17:57:34.010415 systemd[1]: Finished disk-uuid.service. May 15 17:57:34.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.028896 systemd[1]: Starting verity-setup.service... May 15 17:57:34.054770 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 15 17:57:34.166557 systemd[1]: Found device dev-mapper-usr.device. May 15 17:57:34.170932 systemd[1]: Mounting sysusr-usr.mount... May 15 17:57:34.177914 systemd[1]: Finished verity-setup.service. May 15 17:57:34.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.308792 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 17:57:34.308787 systemd[1]: Mounted sysusr-usr.mount. May 15 17:57:34.309390 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 17:57:34.310193 systemd[1]: Starting ignition-setup.service... May 15 17:57:34.311478 systemd[1]: Starting parse-ip-for-networkd.service... May 15 17:57:34.333295 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 17:57:34.333345 kernel: BTRFS info (device vda6): using free space tree May 15 17:57:34.333363 kernel: BTRFS info (device vda6): has skinny extents May 15 17:57:34.353346 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 17:57:34.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.367946 systemd[1]: Finished ignition-setup.service. May 15 17:57:34.369245 systemd[1]: Starting ignition-fetch-offline.service... May 15 17:57:34.449675 systemd[1]: Finished parse-ip-for-networkd.service. May 15 17:57:34.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.450000 audit: BPF prog-id=9 op=LOAD May 15 17:57:34.451595 systemd[1]: Starting systemd-networkd.service... May 15 17:57:34.480496 systemd-networkd[643]: lo: Link UP May 15 17:57:34.480508 systemd-networkd[643]: lo: Gained carrier May 15 17:57:34.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.481478 systemd-networkd[643]: Enumeration completed May 15 17:57:34.481907 systemd-networkd[643]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 17:57:34.483502 systemd[1]: Started systemd-networkd.service. May 15 17:57:34.483616 systemd-networkd[643]: eth0: Link UP May 15 17:57:34.483620 systemd-networkd[643]: eth0: Gained carrier May 15 17:57:34.485446 systemd[1]: Reached target network.target. May 15 17:57:34.488808 systemd[1]: Starting iscsiuio.service... May 15 17:57:34.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.501237 systemd[1]: Started iscsiuio.service. May 15 17:57:34.502591 systemd[1]: Starting iscsid.service... May 15 17:57:34.504464 systemd-networkd[643]: eth0: DHCPv4 address 172.24.4.23/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 17:57:34.510962 iscsid[652]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 17:57:34.510962 iscsid[652]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 17:57:34.510962 iscsid[652]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 17:57:34.510962 iscsid[652]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 17:57:34.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.517643 iscsid[652]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 17:57:34.517643 iscsid[652]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 17:57:34.514204 systemd[1]: Started iscsid.service. May 15 17:57:34.515888 systemd[1]: Starting dracut-initqueue.service... May 15 17:57:34.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.534813 systemd[1]: Finished dracut-initqueue.service. May 15 17:57:34.535388 systemd[1]: Reached target remote-fs-pre.target. May 15 17:57:34.535851 systemd[1]: Reached target remote-cryptsetup.target. May 15 17:57:34.536297 systemd[1]: Reached target remote-fs.target. May 15 17:57:34.537463 systemd[1]: Starting dracut-pre-mount.service... May 15 17:57:34.547209 systemd[1]: Finished dracut-pre-mount.service. May 15 17:57:34.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.651502 ignition[569]: Ignition 2.14.0 May 15 17:57:34.651513 ignition[569]: Stage: fetch-offline May 15 17:57:34.651566 ignition[569]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:57:34.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.654018 systemd[1]: Finished ignition-fetch-offline.service. May 15 17:57:34.651589 ignition[569]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:57:34.655962 systemd[1]: Starting ignition-fetch.service... May 15 17:57:34.652595 ignition[569]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:57:34.652699 ignition[569]: parsed url from cmdline: "" May 15 17:57:34.652703 ignition[569]: no config URL provided May 15 17:57:34.652709 ignition[569]: reading system config file "/usr/lib/ignition/user.ign" May 15 17:57:34.652717 ignition[569]: no config at "/usr/lib/ignition/user.ign" May 15 17:57:34.652722 ignition[569]: failed to fetch config: resource requires networking May 15 17:57:34.653128 ignition[569]: Ignition finished successfully May 15 17:57:34.672970 ignition[666]: Ignition 2.14.0 May 15 17:57:34.672995 ignition[666]: Stage: fetch May 15 17:57:34.673233 ignition[666]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:57:34.673273 ignition[666]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:57:34.675529 ignition[666]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:57:34.675803 ignition[666]: parsed url from cmdline: "" May 15 17:57:34.675814 ignition[666]: no config URL provided May 15 17:57:34.675827 ignition[666]: reading system config file "/usr/lib/ignition/user.ign" May 15 17:57:34.675848 ignition[666]: no config at "/usr/lib/ignition/user.ign" May 15 17:57:34.678349 ignition[666]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 15 17:57:34.678394 ignition[666]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 15 17:57:34.682514 ignition[666]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 15 17:57:34.964676 ignition[666]: GET result: OK May 15 17:57:34.964985 ignition[666]: parsing config with SHA512: 5f321fb8e8f4874dae42161b4711616aa0c824a6132852777c3b45d3bdf5eb13382392708f0d84312180bc3672cbfb4baf66aedd6b9a971e2845e9ff428e6837 May 15 17:57:34.989480 unknown[666]: fetched base config from "system" May 15 17:57:34.989518 unknown[666]: fetched base config from "system" May 15 17:57:34.990689 ignition[666]: fetch: fetch complete May 15 17:57:34.989534 unknown[666]: fetched user config from "openstack" May 15 17:57:34.990702 ignition[666]: fetch: fetch passed May 15 17:57:34.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:34.994331 systemd[1]: Finished ignition-fetch.service. May 15 17:57:34.990815 ignition[666]: Ignition finished successfully May 15 17:57:34.998026 systemd[1]: Starting ignition-kargs.service... May 15 17:57:35.028692 ignition[672]: Ignition 2.14.0 May 15 17:57:35.028719 ignition[672]: Stage: kargs May 15 17:57:35.029022 ignition[672]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:57:35.029067 ignition[672]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:57:35.031394 ignition[672]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:57:35.034098 ignition[672]: kargs: kargs passed May 15 17:57:35.036298 systemd[1]: Finished ignition-kargs.service. May 15 17:57:35.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:35.034202 ignition[672]: Ignition finished successfully May 15 17:57:35.039958 systemd[1]: Starting ignition-disks.service... May 15 17:57:35.057858 ignition[678]: Ignition 2.14.0 May 15 17:57:35.057885 ignition[678]: Stage: disks May 15 17:57:35.058141 ignition[678]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:57:35.058184 ignition[678]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:57:35.060619 ignition[678]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:57:35.063380 ignition[678]: disks: disks passed May 15 17:57:35.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:35.065442 systemd[1]: Finished ignition-disks.service. May 15 17:57:35.063458 ignition[678]: Ignition finished successfully May 15 17:57:35.067100 systemd[1]: Reached target initrd-root-device.target. May 15 17:57:35.068814 systemd[1]: Reached target local-fs-pre.target. May 15 17:57:35.070394 systemd[1]: Reached target local-fs.target. May 15 17:57:35.072148 systemd[1]: Reached target sysinit.target. May 15 17:57:35.073809 systemd[1]: Reached target basic.target. May 15 17:57:35.077389 systemd[1]: Starting systemd-fsck-root.service... May 15 17:57:35.103431 systemd-fsck[686]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 15 17:57:35.127818 systemd[1]: Finished systemd-fsck-root.service. May 15 17:57:35.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:35.130827 systemd[1]: Mounting sysroot.mount... May 15 17:57:35.161799 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 17:57:35.163150 systemd[1]: Mounted sysroot.mount. May 15 17:57:35.165823 systemd[1]: Reached target initrd-root-fs.target. May 15 17:57:35.172125 systemd[1]: Mounting sysroot-usr.mount... May 15 17:57:35.175619 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 17:57:35.179229 systemd[1]: Starting flatcar-openstack-hostname.service... May 15 17:57:35.182100 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 17:57:35.183229 systemd[1]: Reached target ignition-diskful.target. May 15 17:57:35.188856 systemd[1]: Mounted sysroot-usr.mount. May 15 17:57:35.192347 systemd[1]: Starting initrd-setup-root.service... May 15 17:57:35.207935 initrd-setup-root[697]: cut: /sysroot/etc/passwd: No such file or directory May 15 17:57:35.213079 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 17:57:35.235309 initrd-setup-root[706]: cut: /sysroot/etc/group: No such file or directory May 15 17:57:35.242803 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (701) May 15 17:57:35.250912 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 17:57:35.250980 kernel: BTRFS info (device vda6): using free space tree May 15 17:57:35.251008 kernel: BTRFS info (device vda6): has skinny extents May 15 17:57:35.258017 initrd-setup-root[730]: cut: /sysroot/etc/shadow: No such file or directory May 15 17:57:35.265124 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 17:57:35.266685 initrd-setup-root[740]: cut: /sysroot/etc/gshadow: No such file or directory May 15 17:57:35.348577 systemd[1]: Finished initrd-setup-root.service. May 15 17:57:35.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:35.350077 systemd[1]: Starting ignition-mount.service... May 15 17:57:35.354389 systemd[1]: Starting sysroot-boot.service... May 15 17:57:35.360803 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 15 17:57:35.360902 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 15 17:57:35.382088 ignition[760]: INFO : Ignition 2.14.0 May 15 17:57:35.382088 ignition[760]: INFO : Stage: mount May 15 17:57:35.383433 ignition[760]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:57:35.383433 ignition[760]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:57:35.383433 ignition[760]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:57:35.386030 ignition[760]: INFO : mount: mount passed May 15 17:57:35.386030 ignition[760]: INFO : Ignition finished successfully May 15 17:57:35.393006 systemd[1]: Finished ignition-mount.service. May 15 17:57:35.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:35.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:35.394994 systemd[1]: Finished sysroot-boot.service. May 15 17:57:35.411274 coreos-metadata[692]: May 15 17:57:35.411 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 15 17:57:35.428032 coreos-metadata[692]: May 15 17:57:35.427 INFO Fetch successful May 15 17:57:35.428633 coreos-metadata[692]: May 15 17:57:35.428 INFO wrote hostname ci-3510-3-100-3e5a09d652.novalocal to /sysroot/etc/hostname May 15 17:57:35.432594 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 15 17:57:35.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:35.432674 systemd[1]: Finished flatcar-openstack-hostname.service. May 15 17:57:35.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:35.435383 systemd[1]: Starting ignition-files.service... May 15 17:57:35.445293 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 17:57:35.459783 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (769) May 15 17:57:35.466837 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 17:57:35.466860 kernel: BTRFS info (device vda6): using free space tree May 15 17:57:35.466871 kernel: BTRFS info (device vda6): has skinny extents May 15 17:57:35.483030 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 17:57:35.504175 ignition[788]: INFO : Ignition 2.14.0 May 15 17:57:35.504175 ignition[788]: INFO : Stage: files May 15 17:57:35.506242 ignition[788]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:57:35.506242 ignition[788]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:57:35.509705 ignition[788]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:57:35.511084 ignition[788]: DEBUG : files: compiled without relabeling support, skipping May 15 17:57:35.512711 ignition[788]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 17:57:35.512711 ignition[788]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 17:57:35.518332 ignition[788]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 17:57:35.520164 ignition[788]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 17:57:35.522553 unknown[788]: wrote ssh authorized keys file for user: core May 15 17:57:35.526215 ignition[788]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 17:57:35.526215 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 17:57:35.526215 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 17:57:35.623405 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 17:57:36.008381 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 17:57:36.009569 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 17:57:36.010613 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 17:57:36.011484 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 17:57:36.012511 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 17:57:36.013718 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 17:57:36.013718 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 17:57:36.013718 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 17:57:36.013718 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 17:57:36.017328 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 17:57:36.017328 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 17:57:36.017328 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 17:57:36.017328 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 17:57:36.017328 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 17:57:36.017328 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 15 17:57:36.084845 systemd-networkd[643]: eth0: Gained IPv6LL May 15 17:57:36.709876 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 17:57:38.322354 ignition[788]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 17:57:38.323829 ignition[788]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 15 17:57:38.324589 ignition[788]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 15 17:57:38.325355 ignition[788]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 15 17:57:38.326693 ignition[788]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 17:57:38.328693 ignition[788]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 17:57:38.328693 ignition[788]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 15 17:57:38.332518 ignition[788]: INFO : files: op(e): [started] setting preset to enabled for "prepare-helm.service" May 15 17:57:38.332518 ignition[788]: INFO : files: op(e): [finished] setting preset to enabled for "prepare-helm.service" May 15 17:57:38.332518 ignition[788]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 17:57:38.332518 ignition[788]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 17:57:38.354801 kernel: kauditd_printk_skb: 27 callbacks suppressed May 15 17:57:38.354850 kernel: audit: type=1130 audit(1747331858.338:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.336276 systemd[1]: Finished ignition-files.service. May 15 17:57:38.356184 ignition[788]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 17:57:38.356184 ignition[788]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 17:57:38.356184 ignition[788]: INFO : files: files passed May 15 17:57:38.356184 ignition[788]: INFO : Ignition finished successfully May 15 17:57:38.388931 kernel: audit: type=1130 audit(1747331858.358:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.388961 kernel: audit: type=1130 audit(1747331858.368:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.388976 kernel: audit: type=1131 audit(1747331858.368:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.340048 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 17:57:38.353354 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 17:57:38.390625 initrd-setup-root-after-ignition[811]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 17:57:38.354117 systemd[1]: Starting ignition-quench.service... May 15 17:57:38.357269 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 17:57:38.359102 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 17:57:38.359181 systemd[1]: Finished ignition-quench.service. May 15 17:57:38.369634 systemd[1]: Reached target ignition-complete.target. May 15 17:57:38.387678 systemd[1]: Starting initrd-parse-etc.service... May 15 17:57:38.407786 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 17:57:38.408451 systemd[1]: Finished initrd-parse-etc.service. May 15 17:57:38.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.413942 systemd[1]: Reached target initrd-fs.target. May 15 17:57:38.419882 kernel: audit: type=1130 audit(1747331858.408:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.419904 kernel: audit: type=1131 audit(1747331858.413:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.419314 systemd[1]: Reached target initrd.target. May 15 17:57:38.420381 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 17:57:38.421198 systemd[1]: Starting dracut-pre-pivot.service... May 15 17:57:38.433573 systemd[1]: Finished dracut-pre-pivot.service. May 15 17:57:38.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.439974 systemd[1]: Starting initrd-cleanup.service... May 15 17:57:38.441152 kernel: audit: type=1130 audit(1747331858.433:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.452820 systemd[1]: Stopped target nss-lookup.target. May 15 17:57:38.454066 systemd[1]: Stopped target remote-cryptsetup.target. May 15 17:57:38.455320 systemd[1]: Stopped target timers.target. May 15 17:57:38.456475 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 17:57:38.457246 systemd[1]: Stopped dracut-pre-pivot.service. May 15 17:57:38.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.461957 systemd[1]: Stopped target initrd.target. May 15 17:57:38.463929 kernel: audit: type=1131 audit(1747331858.457:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.464527 systemd[1]: Stopped target basic.target. May 15 17:57:38.465581 systemd[1]: Stopped target ignition-complete.target. May 15 17:57:38.466780 systemd[1]: Stopped target ignition-diskful.target. May 15 17:57:38.467937 systemd[1]: Stopped target initrd-root-device.target. May 15 17:57:38.469025 systemd[1]: Stopped target remote-fs.target. May 15 17:57:38.470064 systemd[1]: Stopped target remote-fs-pre.target. May 15 17:57:38.471237 systemd[1]: Stopped target sysinit.target. May 15 17:57:38.472313 systemd[1]: Stopped target local-fs.target. May 15 17:57:38.473349 systemd[1]: Stopped target local-fs-pre.target. May 15 17:57:38.474414 systemd[1]: Stopped target swap.target. May 15 17:57:38.475469 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 17:57:38.476184 systemd[1]: Stopped dracut-pre-mount.service. May 15 17:57:38.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.477369 systemd[1]: Stopped target cryptsetup.target. May 15 17:57:38.482830 kernel: audit: type=1131 audit(1747331858.476:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.483023 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 17:57:38.483761 systemd[1]: Stopped dracut-initqueue.service. May 15 17:57:38.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.484959 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 17:57:38.490426 kernel: audit: type=1131 audit(1747331858.484:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.485114 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 17:57:38.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.491148 systemd[1]: ignition-files.service: Deactivated successfully. May 15 17:57:38.491269 systemd[1]: Stopped ignition-files.service. May 15 17:57:38.493178 systemd[1]: Stopping ignition-mount.service... May 15 17:57:38.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.493673 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 17:57:38.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.493882 systemd[1]: Stopped kmod-static-nodes.service. May 15 17:57:38.495303 systemd[1]: Stopping sysroot-boot.service... May 15 17:57:38.495792 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 17:57:38.507882 ignition[826]: INFO : Ignition 2.14.0 May 15 17:57:38.507882 ignition[826]: INFO : Stage: umount May 15 17:57:38.507882 ignition[826]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:57:38.507882 ignition[826]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:57:38.507882 ignition[826]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:57:38.495960 systemd[1]: Stopped systemd-udev-trigger.service. May 15 17:57:38.519239 ignition[826]: INFO : umount: umount passed May 15 17:57:38.519239 ignition[826]: INFO : Ignition finished successfully May 15 17:57:38.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.496623 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 17:57:38.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.496793 systemd[1]: Stopped dracut-pre-trigger.service. May 15 17:57:38.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.501070 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 17:57:38.501188 systemd[1]: Finished initrd-cleanup.service. May 15 17:57:38.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.514212 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 17:57:38.514315 systemd[1]: Stopped ignition-mount.service. May 15 17:57:38.520090 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 17:57:38.520137 systemd[1]: Stopped ignition-disks.service. May 15 17:57:38.521596 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 17:57:38.521645 systemd[1]: Stopped ignition-kargs.service. May 15 17:57:38.522911 systemd[1]: ignition-fetch.service: Deactivated successfully. May 15 17:57:38.522955 systemd[1]: Stopped ignition-fetch.service. May 15 17:57:38.524067 systemd[1]: Stopped target network.target. May 15 17:57:38.525234 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 17:57:38.525286 systemd[1]: Stopped ignition-fetch-offline.service. May 15 17:57:38.526431 systemd[1]: Stopped target paths.target. May 15 17:57:38.527508 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 17:57:38.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.531803 systemd[1]: Stopped systemd-ask-password-console.path. May 15 17:57:38.532826 systemd[1]: Stopped target slices.target. May 15 17:57:38.533866 systemd[1]: Stopped target sockets.target. May 15 17:57:38.534963 systemd[1]: iscsid.socket: Deactivated successfully. May 15 17:57:38.534991 systemd[1]: Closed iscsid.socket. May 15 17:57:38.536212 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 17:57:38.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.536238 systemd[1]: Closed iscsiuio.socket. May 15 17:57:38.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.538280 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 17:57:38.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.538324 systemd[1]: Stopped ignition-setup.service. May 15 17:57:38.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.539461 systemd[1]: Stopping systemd-networkd.service... May 15 17:57:38.540822 systemd[1]: Stopping systemd-resolved.service... May 15 17:57:38.551000 audit: BPF prog-id=6 op=UNLOAD May 15 17:57:38.542895 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 17:57:38.543372 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 17:57:38.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.543454 systemd[1]: Stopped sysroot-boot.service. May 15 17:57:38.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.544668 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 17:57:38.544705 systemd[1]: Stopped initrd-setup-root.service. May 15 17:57:38.544770 systemd-networkd[643]: eth0: DHCPv6 lease lost May 15 17:57:38.546406 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 17:57:38.546480 systemd[1]: Stopped systemd-networkd.service. May 15 17:57:38.548824 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 17:57:38.548910 systemd[1]: Stopped systemd-resolved.service. May 15 17:57:38.550149 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 17:57:38.565000 audit: BPF prog-id=9 op=UNLOAD May 15 17:57:38.550181 systemd[1]: Closed systemd-networkd.socket. May 15 17:57:38.551996 systemd[1]: Stopping network-cleanup.service... May 15 17:57:38.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.553146 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 17:57:38.553192 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 17:57:38.553697 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 17:57:38.553755 systemd[1]: Stopped systemd-sysctl.service. May 15 17:57:38.554435 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 17:57:38.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.554471 systemd[1]: Stopped systemd-modules-load.service. May 15 17:57:38.555331 systemd[1]: Stopping systemd-udevd.service... May 15 17:57:38.563485 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 17:57:38.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.566384 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 17:57:38.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.566481 systemd[1]: Stopped network-cleanup.service. May 15 17:57:38.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.570448 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 17:57:38.570572 systemd[1]: Stopped systemd-udevd.service. May 15 17:57:38.571728 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 17:57:38.571810 systemd[1]: Closed systemd-udevd-control.socket. May 15 17:57:38.573495 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 17:57:38.573549 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 17:57:38.574977 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 17:57:38.575018 systemd[1]: Stopped dracut-pre-udev.service. May 15 17:57:38.576128 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 17:57:38.576169 systemd[1]: Stopped dracut-cmdline.service. May 15 17:57:38.577887 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 17:57:38.577928 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 17:57:38.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.579615 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 17:57:38.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:38.585865 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 17:57:38.585931 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 17:57:38.587294 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 17:57:38.587395 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 17:57:38.588188 systemd[1]: Reached target initrd-switch-root.target. May 15 17:57:38.590125 systemd[1]: Starting initrd-switch-root.service... May 15 17:57:38.608283 systemd[1]: Switching root. May 15 17:57:38.630881 iscsid[652]: iscsid shutting down. May 15 17:57:38.631647 systemd-journald[186]: Journal stopped May 15 17:57:43.482172 systemd-journald[186]: Received SIGTERM from PID 1 (systemd). May 15 17:57:43.482234 kernel: SELinux: Class mctp_socket not defined in policy. May 15 17:57:43.482253 kernel: SELinux: Class anon_inode not defined in policy. May 15 17:57:43.482265 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 17:57:43.482276 kernel: SELinux: policy capability network_peer_controls=1 May 15 17:57:43.482291 kernel: SELinux: policy capability open_perms=1 May 15 17:57:43.482303 kernel: SELinux: policy capability extended_socket_class=1 May 15 17:57:43.482313 kernel: SELinux: policy capability always_check_network=0 May 15 17:57:43.482325 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 17:57:43.482340 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 17:57:43.482351 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 17:57:43.482362 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 17:57:43.482374 systemd[1]: Successfully loaded SELinux policy in 99.058ms. May 15 17:57:43.482395 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.210ms. May 15 17:57:43.482409 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 17:57:43.482421 systemd[1]: Detected virtualization kvm. May 15 17:57:43.482432 systemd[1]: Detected architecture x86-64. May 15 17:57:43.482443 systemd[1]: Detected first boot. May 15 17:57:43.482457 systemd[1]: Hostname set to . May 15 17:57:43.482473 systemd[1]: Initializing machine ID from VM UUID. May 15 17:57:43.482485 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 17:57:43.482496 systemd[1]: Populated /etc with preset unit settings. May 15 17:57:43.482510 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 17:57:43.482523 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 17:57:43.482536 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 17:57:43.482549 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 17:57:43.482560 systemd[1]: Stopped iscsiuio.service. May 15 17:57:43.482571 systemd[1]: iscsid.service: Deactivated successfully. May 15 17:57:43.482596 systemd[1]: Stopped iscsid.service. May 15 17:57:43.482609 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 17:57:43.482620 systemd[1]: Stopped initrd-switch-root.service. May 15 17:57:43.482632 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 17:57:43.482644 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 17:57:43.482656 systemd[1]: Created slice system-addon\x2drun.slice. May 15 17:57:43.482667 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 15 17:57:43.482679 systemd[1]: Created slice system-getty.slice. May 15 17:57:43.482690 systemd[1]: Created slice system-modprobe.slice. May 15 17:57:43.482704 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 17:57:43.482716 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 17:57:43.482727 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 17:57:43.482754 systemd[1]: Created slice user.slice. May 15 17:57:43.482766 systemd[1]: Started systemd-ask-password-console.path. May 15 17:57:43.482778 systemd[1]: Started systemd-ask-password-wall.path. May 15 17:57:43.482792 systemd[1]: Set up automount boot.automount. May 15 17:57:43.482804 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 17:57:43.482816 systemd[1]: Stopped target initrd-switch-root.target. May 15 17:57:43.482828 systemd[1]: Stopped target initrd-fs.target. May 15 17:57:43.482840 systemd[1]: Stopped target initrd-root-fs.target. May 15 17:57:43.482851 systemd[1]: Reached target integritysetup.target. May 15 17:57:43.482863 systemd[1]: Reached target remote-cryptsetup.target. May 15 17:57:43.482875 systemd[1]: Reached target remote-fs.target. May 15 17:57:43.482886 systemd[1]: Reached target slices.target. May 15 17:57:43.482898 systemd[1]: Reached target swap.target. May 15 17:57:43.482911 systemd[1]: Reached target torcx.target. May 15 17:57:43.482923 systemd[1]: Reached target veritysetup.target. May 15 17:57:43.482934 systemd[1]: Listening on systemd-coredump.socket. May 15 17:57:43.482946 systemd[1]: Listening on systemd-initctl.socket. May 15 17:57:43.482957 systemd[1]: Listening on systemd-networkd.socket. May 15 17:57:43.482969 systemd[1]: Listening on systemd-udevd-control.socket. May 15 17:57:43.482981 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 17:57:43.482993 systemd[1]: Listening on systemd-userdbd.socket. May 15 17:57:43.483006 systemd[1]: Mounting dev-hugepages.mount... May 15 17:57:43.483019 systemd[1]: Mounting dev-mqueue.mount... May 15 17:57:43.483030 systemd[1]: Mounting media.mount... May 15 17:57:43.483056 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:57:43.483068 systemd[1]: Mounting sys-kernel-debug.mount... May 15 17:57:43.483080 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 17:57:43.483091 systemd[1]: Mounting tmp.mount... May 15 17:57:43.483103 systemd[1]: Starting flatcar-tmpfiles.service... May 15 17:57:43.483115 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 17:57:43.483126 systemd[1]: Starting kmod-static-nodes.service... May 15 17:57:43.483156 systemd[1]: Starting modprobe@configfs.service... May 15 17:57:43.483170 systemd[1]: Starting modprobe@dm_mod.service... May 15 17:57:43.483181 systemd[1]: Starting modprobe@drm.service... May 15 17:57:43.483193 systemd[1]: Starting modprobe@efi_pstore.service... May 15 17:57:43.483204 systemd[1]: Starting modprobe@fuse.service... May 15 17:57:43.483216 systemd[1]: Starting modprobe@loop.service... May 15 17:57:43.483228 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 17:57:43.483239 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 17:57:43.483251 systemd[1]: Stopped systemd-fsck-root.service. May 15 17:57:43.483264 kernel: kauditd_printk_skb: 70 callbacks suppressed May 15 17:57:43.483276 kernel: audit: type=1131 audit(1747331863.390:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.483289 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 17:57:43.483300 systemd[1]: Stopped systemd-fsck-usr.service. May 15 17:57:43.483312 kernel: audit: type=1131 audit(1747331863.403:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.483323 systemd[1]: Stopped systemd-journald.service. May 15 17:57:43.483334 kernel: fuse: init (API version 7.34) May 15 17:57:43.483346 kernel: audit: type=1130 audit(1747331863.410:113): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.483363 kernel: audit: type=1131 audit(1747331863.410:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.483375 systemd[1]: Starting systemd-journald.service... May 15 17:57:43.483387 kernel: audit: type=1334 audit(1747331863.412:115): prog-id=21 op=LOAD May 15 17:57:43.483398 kernel: audit: type=1334 audit(1747331863.412:116): prog-id=22 op=LOAD May 15 17:57:43.483408 kernel: audit: type=1334 audit(1747331863.412:117): prog-id=23 op=LOAD May 15 17:57:43.483419 kernel: audit: type=1334 audit(1747331863.412:118): prog-id=19 op=UNLOAD May 15 17:57:43.483431 systemd[1]: Starting systemd-modules-load.service... May 15 17:57:43.483442 kernel: loop: module loaded May 15 17:57:43.483453 systemd[1]: Starting systemd-network-generator.service... May 15 17:57:43.483466 kernel: audit: type=1334 audit(1747331863.412:119): prog-id=20 op=UNLOAD May 15 17:57:43.483477 systemd[1]: Starting systemd-remount-fs.service... May 15 17:57:43.483489 systemd[1]: Starting systemd-udev-trigger.service... May 15 17:57:43.483500 systemd[1]: verity-setup.service: Deactivated successfully. May 15 17:57:43.483512 systemd[1]: Stopped verity-setup.service. May 15 17:57:43.483524 kernel: audit: type=1131 audit(1747331863.455:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.483537 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:57:43.483548 systemd[1]: Mounted dev-hugepages.mount. May 15 17:57:43.483563 systemd[1]: Mounted dev-mqueue.mount. May 15 17:57:43.483574 systemd[1]: Mounted media.mount. May 15 17:57:43.483586 systemd[1]: Mounted sys-kernel-debug.mount. May 15 17:57:43.483597 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 17:57:43.483609 systemd[1]: Mounted tmp.mount. May 15 17:57:43.483620 systemd[1]: Finished flatcar-tmpfiles.service. May 15 17:57:43.483631 systemd[1]: Finished kmod-static-nodes.service. May 15 17:57:43.483646 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 17:57:43.483657 systemd[1]: Finished modprobe@configfs.service. May 15 17:57:43.483672 systemd-journald[951]: Journal started May 15 17:57:43.483714 systemd-journald[951]: Runtime Journal (/run/log/journal/4faad29f390a40ad9461e2e9a2a51a0d) is 8.0M, max 78.4M, 70.4M free. May 15 17:57:38.918000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 17:57:39.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 17:57:39.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 17:57:39.070000 audit: BPF prog-id=10 op=LOAD May 15 17:57:39.070000 audit: BPF prog-id=10 op=UNLOAD May 15 17:57:39.070000 audit: BPF prog-id=11 op=LOAD May 15 17:57:39.070000 audit: BPF prog-id=11 op=UNLOAD May 15 17:57:39.225000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 17:57:39.225000 audit[858]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078c2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:57:39.225000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 17:57:39.228000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 17:57:39.228000 audit[858]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000107999 a2=1ed a3=0 items=2 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:57:39.228000 audit: CWD cwd="/" May 15 17:57:39.228000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:39.228000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:39.228000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 17:57:43.204000 audit: BPF prog-id=12 op=LOAD May 15 17:57:43.204000 audit: BPF prog-id=3 op=UNLOAD May 15 17:57:43.204000 audit: BPF prog-id=13 op=LOAD May 15 17:57:43.204000 audit: BPF prog-id=14 op=LOAD May 15 17:57:43.204000 audit: BPF prog-id=4 op=UNLOAD May 15 17:57:43.204000 audit: BPF prog-id=5 op=UNLOAD May 15 17:57:43.205000 audit: BPF prog-id=15 op=LOAD May 15 17:57:43.205000 audit: BPF prog-id=12 op=UNLOAD May 15 17:57:43.205000 audit: BPF prog-id=16 op=LOAD May 15 17:57:43.205000 audit: BPF prog-id=17 op=LOAD May 15 17:57:43.205000 audit: BPF prog-id=13 op=UNLOAD May 15 17:57:43.205000 audit: BPF prog-id=14 op=UNLOAD May 15 17:57:43.206000 audit: BPF prog-id=18 op=LOAD May 15 17:57:43.206000 audit: BPF prog-id=15 op=UNLOAD May 15 17:57:43.207000 audit: BPF prog-id=19 op=LOAD May 15 17:57:43.207000 audit: BPF prog-id=20 op=LOAD May 15 17:57:43.207000 audit: BPF prog-id=16 op=UNLOAD May 15 17:57:43.207000 audit: BPF prog-id=17 op=UNLOAD May 15 17:57:43.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.214000 audit: BPF prog-id=18 op=UNLOAD May 15 17:57:43.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.486614 systemd[1]: Started systemd-journald.service. May 15 17:57:43.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.412000 audit: BPF prog-id=21 op=LOAD May 15 17:57:43.412000 audit: BPF prog-id=22 op=LOAD May 15 17:57:43.412000 audit: BPF prog-id=23 op=LOAD May 15 17:57:43.412000 audit: BPF prog-id=19 op=UNLOAD May 15 17:57:43.412000 audit: BPF prog-id=20 op=UNLOAD May 15 17:57:43.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.480000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 17:57:43.480000 audit[951]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd9e866820 a2=4000 a3=7ffd9e8668bc items=0 ppid=1 pid=951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:57:43.480000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 17:57:43.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:39.221779 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 17:57:43.203256 systemd[1]: Queued start job for default target multi-user.target. May 15 17:57:39.223166 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 17:57:43.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.203270 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 17:57:39.223189 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 17:57:43.208391 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 17:57:39.223227 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 17:57:43.487337 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 17:57:39.223239 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 17:57:43.487454 systemd[1]: Finished modprobe@dm_mod.service. May 15 17:57:39.223273 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 17:57:43.488163 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 17:57:39.223288 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 17:57:39.223505 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 17:57:39.223547 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 17:57:39.223563 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 17:57:39.224682 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 17:57:39.224722 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 17:57:39.224765 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 17:57:39.224783 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 17:57:39.224803 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 17:57:39.224820 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 17:57:42.730679 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 17:57:42.731005 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 17:57:42.731114 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 17:57:42.731312 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 17:57:42.731372 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 17:57:42.731441 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:57:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 17:57:43.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.490858 systemd[1]: Finished modprobe@drm.service. May 15 17:57:43.492039 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 17:57:43.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.492373 systemd[1]: Finished modprobe@efi_pstore.service. May 15 17:57:43.493055 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 17:57:43.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.493414 systemd[1]: Finished modprobe@fuse.service. May 15 17:57:43.494138 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 17:57:43.494506 systemd[1]: Finished modprobe@loop.service. May 15 17:57:43.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.495397 systemd[1]: Finished systemd-modules-load.service. May 15 17:57:43.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.496336 systemd[1]: Finished systemd-network-generator.service. May 15 17:57:43.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.497116 systemd[1]: Finished systemd-remount-fs.service. May 15 17:57:43.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.498098 systemd[1]: Reached target network-pre.target. May 15 17:57:43.499702 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 17:57:43.503603 systemd[1]: Mounting sys-kernel-config.mount... May 15 17:57:43.506052 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 17:57:43.508697 systemd[1]: Starting systemd-hwdb-update.service... May 15 17:57:43.514227 systemd[1]: Starting systemd-journal-flush.service... May 15 17:57:43.514917 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 17:57:43.516014 systemd[1]: Starting systemd-random-seed.service... May 15 17:57:43.516536 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 17:57:43.517470 systemd[1]: Starting systemd-sysctl.service... May 15 17:57:43.519516 systemd[1]: Starting systemd-sysusers.service... May 15 17:57:43.524274 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 17:57:43.524837 systemd[1]: Mounted sys-kernel-config.mount. May 15 17:57:43.531907 systemd-journald[951]: Time spent on flushing to /var/log/journal/4faad29f390a40ad9461e2e9a2a51a0d is 29.508ms for 1116 entries. May 15 17:57:43.531907 systemd-journald[951]: System Journal (/var/log/journal/4faad29f390a40ad9461e2e9a2a51a0d) is 8.0M, max 584.8M, 576.8M free. May 15 17:57:43.610008 systemd-journald[951]: Received client request to flush runtime journal. May 15 17:57:43.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.550109 systemd[1]: Finished systemd-udev-trigger.service. May 15 17:57:43.551910 systemd[1]: Starting systemd-udev-settle.service... May 15 17:57:43.610551 udevadm[966]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 15 17:57:43.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:43.560016 systemd[1]: Finished systemd-random-seed.service. May 15 17:57:43.560766 systemd[1]: Reached target first-boot-complete.target. May 15 17:57:43.564297 systemd[1]: Finished systemd-sysctl.service. May 15 17:57:43.605592 systemd[1]: Finished systemd-sysusers.service. May 15 17:57:43.610866 systemd[1]: Finished systemd-journal-flush.service. May 15 17:57:44.460623 systemd[1]: Finished systemd-hwdb-update.service. May 15 17:57:44.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:44.462000 audit: BPF prog-id=24 op=LOAD May 15 17:57:44.462000 audit: BPF prog-id=25 op=LOAD May 15 17:57:44.462000 audit: BPF prog-id=7 op=UNLOAD May 15 17:57:44.462000 audit: BPF prog-id=8 op=UNLOAD May 15 17:57:44.464673 systemd[1]: Starting systemd-udevd.service... May 15 17:57:44.505062 systemd-udevd[969]: Using default interface naming scheme 'v252'. May 15 17:57:44.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:44.569615 systemd[1]: Started systemd-udevd.service. May 15 17:57:44.576000 audit: BPF prog-id=26 op=LOAD May 15 17:57:44.578723 systemd[1]: Starting systemd-networkd.service... May 15 17:57:44.597000 audit: BPF prog-id=27 op=LOAD May 15 17:57:44.597000 audit: BPF prog-id=28 op=LOAD May 15 17:57:44.597000 audit: BPF prog-id=29 op=LOAD May 15 17:57:44.599891 systemd[1]: Starting systemd-userdbd.service... May 15 17:57:44.634029 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 17:57:44.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:44.675960 systemd[1]: Started systemd-userdbd.service. May 15 17:57:44.695251 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 17:57:44.717751 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 17:57:44.741007 kernel: ACPI: button: Power Button [PWRF] May 15 17:57:44.736000 audit[982]: AVC avc: denied { confidentiality } for pid=982 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 17:57:44.736000 audit[982]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ff28ce3d70 a1=338ac a2=7fa3b44f5bc5 a3=5 items=110 ppid=969 pid=982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:57:44.736000 audit: CWD cwd="/" May 15 17:57:44.736000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=1 name=(null) inode=13868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=2 name=(null) inode=13868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=3 name=(null) inode=13869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=4 name=(null) inode=13868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=5 name=(null) inode=13870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=6 name=(null) inode=13868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=7 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=8 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=9 name=(null) inode=13872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=10 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=11 name=(null) inode=13873 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=12 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=13 name=(null) inode=13874 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=14 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=15 name=(null) inode=13875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=16 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=17 name=(null) inode=13876 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=18 name=(null) inode=13868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=19 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=20 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=21 name=(null) inode=13878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=22 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=23 name=(null) inode=13879 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=24 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=25 name=(null) inode=13880 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=26 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=27 name=(null) inode=13881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=28 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=29 name=(null) inode=13882 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=30 name=(null) inode=13868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=31 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=32 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=33 name=(null) inode=13884 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=34 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=35 name=(null) inode=13885 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=36 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=37 name=(null) inode=13886 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=38 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=39 name=(null) inode=13887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=40 name=(null) inode=13883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=41 name=(null) inode=13888 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=42 name=(null) inode=13868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=43 name=(null) inode=13889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=44 name=(null) inode=13889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=45 name=(null) inode=13890 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=46 name=(null) inode=13889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=47 name=(null) inode=13891 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=48 name=(null) inode=13889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=49 name=(null) inode=13892 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=50 name=(null) inode=13889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=51 name=(null) inode=13893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=52 name=(null) inode=13889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=53 name=(null) inode=13894 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=55 name=(null) inode=13895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=56 name=(null) inode=13895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=57 name=(null) inode=13896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=58 name=(null) inode=13895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=59 name=(null) inode=13897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=60 name=(null) inode=13895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=61 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=62 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=63 name=(null) inode=13899 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=64 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=65 name=(null) inode=13900 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=66 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=67 name=(null) inode=13901 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=68 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=69 name=(null) inode=13902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=70 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=71 name=(null) inode=13903 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=72 name=(null) inode=13895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=73 name=(null) inode=13904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=74 name=(null) inode=13904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=75 name=(null) inode=13905 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=76 name=(null) inode=13904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=77 name=(null) inode=13906 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=78 name=(null) inode=13904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=79 name=(null) inode=13907 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=80 name=(null) inode=13904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=81 name=(null) inode=13908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=82 name=(null) inode=13904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=83 name=(null) inode=13909 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=84 name=(null) inode=13895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=85 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=86 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=87 name=(null) inode=13911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=88 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=89 name=(null) inode=13912 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=90 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=91 name=(null) inode=13913 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=92 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=93 name=(null) inode=13914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=94 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=95 name=(null) inode=13915 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=96 name=(null) inode=13895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=97 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=98 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=99 name=(null) inode=13917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=100 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=101 name=(null) inode=13918 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=102 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=103 name=(null) inode=13919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=104 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=105 name=(null) inode=13920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=106 name=(null) inode=13916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=107 name=(null) inode=13921 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PATH item=109 name=(null) inode=13922 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:57:44.736000 audit: PROCTITLE proctitle="(udev-worker)" May 15 17:57:44.764294 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 15 17:57:44.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:44.761454 systemd-networkd[980]: lo: Link UP May 15 17:57:44.761465 systemd-networkd[980]: lo: Gained carrier May 15 17:57:44.761914 systemd-networkd[980]: Enumeration completed May 15 17:57:44.762053 systemd-networkd[980]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 17:57:44.763631 systemd[1]: Started systemd-networkd.service. May 15 17:57:44.765849 systemd-networkd[980]: eth0: Link UP May 15 17:57:44.765853 systemd-networkd[980]: eth0: Gained carrier May 15 17:57:44.773933 systemd-networkd[980]: eth0: DHCPv4 address 172.24.4.23/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 17:57:44.792758 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 17:57:44.796751 kernel: mousedev: PS/2 mouse device common for all mice May 15 17:57:44.840421 systemd[1]: Finished systemd-udev-settle.service. May 15 17:57:44.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:44.843283 systemd[1]: Starting lvm2-activation-early.service... May 15 17:57:44.881186 lvm[1003]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 17:57:44.923649 systemd[1]: Finished lvm2-activation-early.service. May 15 17:57:44.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:44.925172 systemd[1]: Reached target cryptsetup.target. May 15 17:57:44.928579 systemd[1]: Starting lvm2-activation.service... May 15 17:57:44.937978 lvm[1004]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 17:57:44.976668 systemd[1]: Finished lvm2-activation.service. May 15 17:57:44.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:44.978106 systemd[1]: Reached target local-fs-pre.target. May 15 17:57:44.979341 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 17:57:44.979405 systemd[1]: Reached target local-fs.target. May 15 17:57:44.980554 systemd[1]: Reached target machines.target. May 15 17:57:44.984302 systemd[1]: Starting ldconfig.service... May 15 17:57:44.986551 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 17:57:44.986672 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:57:44.989563 systemd[1]: Starting systemd-boot-update.service... May 15 17:57:44.993185 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 17:57:44.996811 systemd[1]: Starting systemd-machine-id-commit.service... May 15 17:57:45.004941 systemd[1]: Starting systemd-sysext.service... May 15 17:57:45.023126 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1006 (bootctl) May 15 17:57:45.025764 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 17:57:45.042565 systemd[1]: Unmounting usr-share-oem.mount... May 15 17:57:45.124302 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 17:57:45.124777 systemd[1]: Unmounted usr-share-oem.mount. May 15 17:57:45.146898 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 17:57:45.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.166470 kernel: loop0: detected capacity change from 0 to 210664 May 15 17:57:45.404237 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 17:57:45.407185 systemd[1]: Finished systemd-machine-id-commit.service. May 15 17:57:45.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.449959 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 17:57:45.488804 kernel: loop1: detected capacity change from 0 to 210664 May 15 17:57:45.531850 (sd-sysext)[1020]: Using extensions 'kubernetes'. May 15 17:57:45.533930 (sd-sysext)[1020]: Merged extensions into '/usr'. May 15 17:57:45.563984 systemd-fsck[1017]: fsck.fat 4.2 (2021-01-31) May 15 17:57:45.563984 systemd-fsck[1017]: /dev/vda1: 790 files, 120732/258078 clusters May 15 17:57:45.600062 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 17:57:45.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.607949 systemd[1]: Mounting boot.mount... May 15 17:57:45.608582 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:57:45.610265 systemd[1]: Mounting usr-share-oem.mount... May 15 17:57:45.611175 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 17:57:45.614653 systemd[1]: Starting modprobe@dm_mod.service... May 15 17:57:45.616703 systemd[1]: Starting modprobe@efi_pstore.service... May 15 17:57:45.619860 systemd[1]: Starting modprobe@loop.service... May 15 17:57:45.620612 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 17:57:45.620770 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:57:45.620928 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:57:45.623352 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 17:57:45.623502 systemd[1]: Finished modprobe@dm_mod.service. May 15 17:57:45.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.624702 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 17:57:45.624876 systemd[1]: Finished modprobe@efi_pstore.service. May 15 17:57:45.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.625988 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 17:57:45.632415 systemd[1]: Mounted boot.mount. May 15 17:57:45.633427 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 17:57:45.633547 systemd[1]: Finished modprobe@loop.service. May 15 17:57:45.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.634891 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 17:57:45.642513 systemd[1]: Mounted usr-share-oem.mount. May 15 17:57:45.644429 systemd[1]: Finished systemd-sysext.service. May 15 17:57:45.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.646509 systemd[1]: Starting ensure-sysext.service... May 15 17:57:45.648708 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 17:57:45.655793 systemd[1]: Reloading. May 15 17:57:45.686089 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 17:57:45.704755 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 17:57:45.724098 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 17:57:45.745846 /usr/lib/systemd/system-generators/torcx-generator[1047]: time="2025-05-15T17:57:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 17:57:45.746215 /usr/lib/systemd/system-generators/torcx-generator[1047]: time="2025-05-15T17:57:45Z" level=info msg="torcx already run" May 15 17:57:45.858592 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 17:57:45.858817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 17:57:45.886323 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 17:57:45.940126 systemd-networkd[980]: eth0: Gained IPv6LL May 15 17:57:45.961000 audit: BPF prog-id=30 op=LOAD May 15 17:57:45.961000 audit: BPF prog-id=26 op=UNLOAD May 15 17:57:45.964000 audit: BPF prog-id=31 op=LOAD May 15 17:57:45.964000 audit: BPF prog-id=21 op=UNLOAD May 15 17:57:45.964000 audit: BPF prog-id=32 op=LOAD May 15 17:57:45.964000 audit: BPF prog-id=33 op=LOAD May 15 17:57:45.964000 audit: BPF prog-id=22 op=UNLOAD May 15 17:57:45.964000 audit: BPF prog-id=23 op=UNLOAD May 15 17:57:45.965000 audit: BPF prog-id=34 op=LOAD May 15 17:57:45.965000 audit: BPF prog-id=35 op=LOAD May 15 17:57:45.965000 audit: BPF prog-id=24 op=UNLOAD May 15 17:57:45.965000 audit: BPF prog-id=25 op=UNLOAD May 15 17:57:45.966000 audit: BPF prog-id=36 op=LOAD May 15 17:57:45.966000 audit: BPF prog-id=27 op=UNLOAD May 15 17:57:45.966000 audit: BPF prog-id=37 op=LOAD May 15 17:57:45.966000 audit: BPF prog-id=38 op=LOAD May 15 17:57:45.966000 audit: BPF prog-id=28 op=UNLOAD May 15 17:57:45.966000 audit: BPF prog-id=29 op=UNLOAD May 15 17:57:45.972063 systemd[1]: Finished systemd-boot-update.service. May 15 17:57:45.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.974194 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 17:57:45.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:45.982064 systemd[1]: Starting audit-rules.service... May 15 17:57:45.983983 systemd[1]: Starting clean-ca-certificates.service... May 15 17:57:45.987051 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 17:57:45.990000 audit: BPF prog-id=39 op=LOAD May 15 17:57:45.993000 audit: BPF prog-id=40 op=LOAD May 15 17:57:45.992433 systemd[1]: Starting systemd-resolved.service... May 15 17:57:45.995549 systemd[1]: Starting systemd-timesyncd.service... May 15 17:57:45.997349 systemd[1]: Starting systemd-update-utmp.service... May 15 17:57:46.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.003687 systemd[1]: Finished clean-ca-certificates.service. May 15 17:57:46.004539 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 17:57:46.010000 audit[1101]: SYSTEM_BOOT pid=1101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 17:57:46.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.016350 systemd[1]: Finished systemd-update-utmp.service. May 15 17:57:46.032898 ldconfig[1005]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 17:57:46.017967 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 17:57:46.019421 systemd[1]: Starting modprobe@dm_mod.service... May 15 17:57:46.021322 systemd[1]: Starting modprobe@efi_pstore.service... May 15 17:57:46.024058 systemd[1]: Starting modprobe@loop.service... May 15 17:57:46.025842 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 17:57:46.025963 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:57:46.026083 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 17:57:46.026944 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 17:57:46.027070 systemd[1]: Finished modprobe@dm_mod.service. May 15 17:57:46.027940 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 17:57:46.028046 systemd[1]: Finished modprobe@efi_pstore.service. May 15 17:57:46.029527 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 17:57:46.029638 systemd[1]: Finished modprobe@loop.service. May 15 17:57:46.030488 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 17:57:46.030612 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 17:57:46.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.033831 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 17:57:46.035573 systemd[1]: Starting modprobe@dm_mod.service... May 15 17:57:46.037983 systemd[1]: Starting modprobe@efi_pstore.service... May 15 17:57:46.040205 systemd[1]: Starting modprobe@loop.service... May 15 17:57:46.040839 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 17:57:46.041146 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:57:46.041292 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 17:57:46.043249 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 17:57:46.043369 systemd[1]: Finished modprobe@dm_mod.service. May 15 17:57:46.048557 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 17:57:46.051363 systemd[1]: Starting modprobe@dm_mod.service... May 15 17:57:46.053193 systemd[1]: Starting modprobe@drm.service... May 15 17:57:46.053958 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 17:57:46.054091 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:57:46.056253 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 17:57:46.056903 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 17:57:46.058028 systemd[1]: Finished ldconfig.service. May 15 17:57:46.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.060244 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 17:57:46.060368 systemd[1]: Finished modprobe@efi_pstore.service. May 15 17:57:46.061333 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 17:57:46.061467 systemd[1]: Finished modprobe@loop.service. May 15 17:57:46.062809 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 17:57:46.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.064982 systemd[1]: Finished ensure-sysext.service. May 15 17:57:46.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.068380 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 17:57:46.070169 systemd[1]: Starting systemd-update-done.service... May 15 17:57:46.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.071441 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 17:57:46.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:57:46.077560 systemd[1]: Finished systemd-update-done.service. May 15 17:57:46.078381 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 17:57:46.078493 systemd[1]: Finished modprobe@dm_mod.service. May 15 17:57:46.079170 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 17:57:46.079275 systemd[1]: Finished modprobe@drm.service. May 15 17:57:46.079884 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 17:57:46.111000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 17:57:46.111000 audit[1125]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4f2354f0 a2=420 a3=0 items=0 ppid=1095 pid=1125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:57:46.111000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 17:57:46.112903 augenrules[1125]: No rules May 15 17:57:46.113302 systemd[1]: Finished audit-rules.service. May 15 17:57:46.123803 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:57:46.123829 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:57:46.126486 systemd-resolved[1098]: Positive Trust Anchors: May 15 17:57:46.126502 systemd-resolved[1098]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 17:57:46.126539 systemd-resolved[1098]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 17:57:46.130357 systemd[1]: Started systemd-timesyncd.service. May 15 17:57:46.131015 systemd[1]: Reached target time-set.target. May 15 17:57:46.135245 systemd-resolved[1098]: Using system hostname 'ci-3510-3-100-3e5a09d652.novalocal'. May 15 17:57:46.136644 systemd[1]: Started systemd-resolved.service. May 15 17:57:46.137207 systemd[1]: Reached target network.target. May 15 17:57:46.137710 systemd[1]: Reached target network-online.target. May 15 17:57:46.138168 systemd[1]: Reached target nss-lookup.target. May 15 17:57:46.138623 systemd[1]: Reached target sysinit.target. May 15 17:57:46.139144 systemd[1]: Started motdgen.path. May 15 17:57:46.139583 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 17:57:46.140234 systemd[1]: Started logrotate.timer. May 15 17:57:46.140747 systemd[1]: Started mdadm.timer. May 15 17:57:46.141159 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 17:57:46.141600 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 17:57:46.141629 systemd[1]: Reached target paths.target. May 15 17:57:46.142063 systemd[1]: Reached target timers.target. May 15 17:57:46.142869 systemd[1]: Listening on dbus.socket. May 15 17:57:46.144709 systemd[1]: Starting docker.socket... May 15 17:57:46.148568 systemd[1]: Listening on sshd.socket. May 15 17:57:46.149150 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:57:46.149608 systemd[1]: Listening on docker.socket. May 15 17:57:46.150129 systemd[1]: Reached target sockets.target. May 15 17:57:46.150568 systemd[1]: Reached target basic.target. May 15 17:57:46.151099 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 17:57:46.151130 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 17:57:46.152083 systemd[1]: Starting containerd.service... May 15 17:57:46.153532 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 15 17:57:46.155540 systemd[1]: Starting dbus.service... May 15 17:57:46.157836 systemd[1]: Starting enable-oem-cloudinit.service... May 15 17:57:46.160589 systemd[1]: Starting extend-filesystems.service... May 15 17:57:46.161236 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 17:57:46.167584 systemd[1]: Starting kubelet.service... May 15 17:57:46.169271 systemd[1]: Starting motdgen.service... May 15 17:57:46.171695 systemd[1]: Starting prepare-helm.service... May 15 17:57:46.173253 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 17:57:46.177878 systemd[1]: Starting sshd-keygen.service... May 15 17:57:46.181897 systemd[1]: Starting systemd-logind.service... May 15 17:57:46.182385 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:57:46.182438 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 17:57:46.182899 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 17:57:46.183545 systemd[1]: Starting update-engine.service... May 15 17:57:46.186969 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 17:57:46.190931 jq[1151]: true May 15 17:57:46.206445 jq[1138]: false May 15 17:57:46.206256 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 17:57:46.206443 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 17:57:46.208432 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 17:57:46.208596 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 17:57:46.224100 tar[1154]: linux-amd64/helm May 15 17:57:46.224828 jq[1155]: true May 15 17:57:46.252648 extend-filesystems[1139]: Found loop1 May 15 17:57:46.252648 extend-filesystems[1139]: Found vda May 15 17:57:46.252648 extend-filesystems[1139]: Found vda1 May 15 17:57:46.252648 extend-filesystems[1139]: Found vda2 May 15 17:57:46.252648 extend-filesystems[1139]: Found vda3 May 15 17:57:46.252648 extend-filesystems[1139]: Found usr May 15 17:57:46.252648 extend-filesystems[1139]: Found vda4 May 15 17:57:46.252648 extend-filesystems[1139]: Found vda6 May 15 17:57:46.252648 extend-filesystems[1139]: Found vda7 May 15 17:57:46.252648 extend-filesystems[1139]: Found vda9 May 15 17:57:46.252648 extend-filesystems[1139]: Checking size of /dev/vda9 May 15 17:57:46.257863 systemd[1]: motdgen.service: Deactivated successfully. May 15 17:57:46.258031 systemd[1]: Finished motdgen.service. May 15 17:57:46.275664 dbus-daemon[1135]: [system] SELinux support is enabled May 15 17:57:46.275861 systemd[1]: Started dbus.service. May 15 17:57:46.278536 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 17:57:46.278566 systemd[1]: Reached target system-config.target. May 15 17:57:46.279117 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 17:57:46.279140 systemd[1]: Reached target user-config.target. May 15 17:57:46.280651 systemd-timesyncd[1099]: Contacted time server 45.63.54.13:123 (0.flatcar.pool.ntp.org). May 15 17:57:46.280720 systemd-timesyncd[1099]: Initial clock synchronization to Thu 2025-05-15 17:57:46.254801 UTC. May 15 17:57:46.293676 extend-filesystems[1139]: Resized partition /dev/vda9 May 15 17:57:46.304288 extend-filesystems[1190]: resize2fs 1.46.5 (30-Dec-2021) May 15 17:57:46.356760 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 15 17:57:46.357696 update_engine[1149]: I0515 17:57:46.356133 1149 main.cc:92] Flatcar Update Engine starting May 15 17:57:46.362992 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 15 17:57:46.366002 systemd[1]: Started update-engine.service. May 15 17:57:46.400327 update_engine[1149]: I0515 17:57:46.366036 1149 update_check_scheduler.cc:74] Next update check in 7m25s May 15 17:57:46.368852 systemd[1]: Started locksmithd.service. May 15 17:57:46.401464 extend-filesystems[1190]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 17:57:46.401464 extend-filesystems[1190]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 17:57:46.401464 extend-filesystems[1190]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 15 17:57:46.424288 extend-filesystems[1139]: Resized filesystem in /dev/vda9 May 15 17:57:46.424878 bash[1187]: Updated "/home/core/.ssh/authorized_keys" May 15 17:57:46.403150 systemd-logind[1148]: Watching system buttons on /dev/input/event1 (Power Button) May 15 17:57:46.425172 env[1156]: time="2025-05-15T17:57:46.403292100Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 17:57:46.403170 systemd-logind[1148]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 17:57:46.403298 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 17:57:46.403466 systemd[1]: Finished extend-filesystems.service. May 15 17:57:46.405063 systemd-logind[1148]: New seat seat0. May 15 17:57:46.407685 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 17:57:46.415723 systemd[1]: Started systemd-logind.service. May 15 17:57:46.467454 env[1156]: time="2025-05-15T17:57:46.467338209Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 17:57:46.467596 env[1156]: time="2025-05-15T17:57:46.467517024Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.470600908Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.470632477Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.470851137Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.470871475Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.470885632Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.470897153Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.470973887Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.471222604Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.471343691Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 17:57:46.471449 env[1156]: time="2025-05-15T17:57:46.471361104Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 17:57:46.471714 env[1156]: time="2025-05-15T17:57:46.471410035Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 17:57:46.471714 env[1156]: time="2025-05-15T17:57:46.471424793Z" level=info msg="metadata content store policy set" policy=shared May 15 17:57:46.485917 env[1156]: time="2025-05-15T17:57:46.485700928Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 17:57:46.485917 env[1156]: time="2025-05-15T17:57:46.485748247Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 17:57:46.485917 env[1156]: time="2025-05-15T17:57:46.485765409Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 17:57:46.485917 env[1156]: time="2025-05-15T17:57:46.485816445Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 17:57:46.485917 env[1156]: time="2025-05-15T17:57:46.485835470Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 17:57:46.485917 env[1156]: time="2025-05-15T17:57:46.485851400Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 17:57:46.486157 env[1156]: time="2025-05-15T17:57:46.485935688Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 17:57:46.486157 env[1156]: time="2025-05-15T17:57:46.485972217Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 17:57:46.486157 env[1156]: time="2025-05-15T17:57:46.485988928Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 17:57:46.486157 env[1156]: time="2025-05-15T17:57:46.486004648Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 17:57:46.486157 env[1156]: time="2025-05-15T17:57:46.486020237Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 17:57:46.486157 env[1156]: time="2025-05-15T17:57:46.486034574Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 17:57:46.486157 env[1156]: time="2025-05-15T17:57:46.486134621Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 17:57:46.486315 env[1156]: time="2025-05-15T17:57:46.486233326Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 17:57:46.486679 env[1156]: time="2025-05-15T17:57:46.486647984Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 17:57:46.486720 env[1156]: time="2025-05-15T17:57:46.486704731Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 17:57:46.486765 env[1156]: time="2025-05-15T17:57:46.486725760Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 17:57:46.486842 env[1156]: time="2025-05-15T17:57:46.486820918Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 17:57:46.486882 env[1156]: time="2025-05-15T17:57:46.486843851Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 17:57:46.486962 env[1156]: time="2025-05-15T17:57:46.486859461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 17:57:46.486997 env[1156]: time="2025-05-15T17:57:46.486969938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 17:57:46.486997 env[1156]: time="2025-05-15T17:57:46.486989234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 17:57:46.487070 env[1156]: time="2025-05-15T17:57:46.487005705Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 17:57:46.487070 env[1156]: time="2025-05-15T17:57:46.487021535Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 17:57:46.487070 env[1156]: time="2025-05-15T17:57:46.487036463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 17:57:46.487070 env[1156]: time="2025-05-15T17:57:46.487061329Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 17:57:46.487230 env[1156]: time="2025-05-15T17:57:46.487205119Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 17:57:46.487276 env[1156]: time="2025-05-15T17:57:46.487234093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 17:57:46.487276 env[1156]: time="2025-05-15T17:57:46.487267286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 17:57:46.487332 env[1156]: time="2025-05-15T17:57:46.487283386Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 17:57:46.487332 env[1156]: time="2025-05-15T17:57:46.487302321Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 17:57:46.487332 env[1156]: time="2025-05-15T17:57:46.487316588Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 17:57:46.487408 env[1156]: time="2025-05-15T17:57:46.487339882Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 17:57:46.487408 env[1156]: time="2025-05-15T17:57:46.487382031Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 17:57:46.487893 env[1156]: time="2025-05-15T17:57:46.487618604Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 17:57:46.487893 env[1156]: time="2025-05-15T17:57:46.487698685Z" level=info msg="Connect containerd service" May 15 17:57:46.487893 env[1156]: time="2025-05-15T17:57:46.487748769Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 17:57:46.492082 env[1156]: time="2025-05-15T17:57:46.488374773Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 17:57:46.492082 env[1156]: time="2025-05-15T17:57:46.488608832Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 17:57:46.492082 env[1156]: time="2025-05-15T17:57:46.488650490Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 17:57:46.492082 env[1156]: time="2025-05-15T17:57:46.488700684Z" level=info msg="containerd successfully booted in 0.117907s" May 15 17:57:46.488818 systemd[1]: Started containerd.service. May 15 17:57:46.492557 env[1156]: time="2025-05-15T17:57:46.492492175Z" level=info msg="Start subscribing containerd event" May 15 17:57:46.492598 env[1156]: time="2025-05-15T17:57:46.492580501Z" level=info msg="Start recovering state" May 15 17:57:46.492674 env[1156]: time="2025-05-15T17:57:46.492654068Z" level=info msg="Start event monitor" May 15 17:57:46.492707 env[1156]: time="2025-05-15T17:57:46.492679847Z" level=info msg="Start snapshots syncer" May 15 17:57:46.492707 env[1156]: time="2025-05-15T17:57:46.492693252Z" level=info msg="Start cni network conf syncer for default" May 15 17:57:46.492785 env[1156]: time="2025-05-15T17:57:46.492707429Z" level=info msg="Start streaming server" May 15 17:57:46.978246 systemd[1]: Created slice system-sshd.slice. May 15 17:57:46.980323 tar[1154]: linux-amd64/LICENSE May 15 17:57:46.980323 tar[1154]: linux-amd64/README.md May 15 17:57:46.984192 systemd[1]: Finished prepare-helm.service. May 15 17:57:47.527196 locksmithd[1193]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 17:57:47.762879 sshd_keygen[1167]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 17:57:47.785765 systemd[1]: Finished sshd-keygen.service. May 15 17:57:47.787824 systemd[1]: Starting issuegen.service... May 15 17:57:47.789242 systemd[1]: Started sshd@0-172.24.4.23:22-172.24.4.1:39736.service. May 15 17:57:47.796830 systemd[1]: issuegen.service: Deactivated successfully. May 15 17:57:47.796980 systemd[1]: Finished issuegen.service. May 15 17:57:47.798885 systemd[1]: Starting systemd-user-sessions.service... May 15 17:57:47.806790 systemd[1]: Finished systemd-user-sessions.service. May 15 17:57:47.809653 systemd[1]: Started getty@tty1.service. May 15 17:57:47.811479 systemd[1]: Started serial-getty@ttyS0.service. May 15 17:57:47.812145 systemd[1]: Reached target getty.target. May 15 17:57:48.659001 systemd[1]: Started kubelet.service. May 15 17:57:48.977571 sshd[1214]: Accepted publickey for core from 172.24.4.1 port 39736 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:57:48.982981 sshd[1214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:57:49.013240 systemd[1]: Created slice user-500.slice. May 15 17:57:49.018706 systemd[1]: Starting user-runtime-dir@500.service... May 15 17:57:49.031483 systemd-logind[1148]: New session 1 of user core. May 15 17:57:49.043461 systemd[1]: Finished user-runtime-dir@500.service. May 15 17:57:49.048434 systemd[1]: Starting user@500.service... May 15 17:57:49.054993 (systemd)[1230]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 17:57:49.177613 systemd[1230]: Queued start job for default target default.target. May 15 17:57:49.178422 systemd[1230]: Reached target paths.target. May 15 17:57:49.178534 systemd[1230]: Reached target sockets.target. May 15 17:57:49.178631 systemd[1230]: Reached target timers.target. May 15 17:57:49.178721 systemd[1230]: Reached target basic.target. May 15 17:57:49.178908 systemd[1]: Started user@500.service. May 15 17:57:49.180294 systemd[1]: Started session-1.scope. May 15 17:57:49.181211 systemd[1230]: Reached target default.target. May 15 17:57:49.181421 systemd[1230]: Startup finished in 112ms. May 15 17:57:49.698615 systemd[1]: Started sshd@1-172.24.4.23:22-172.24.4.1:39746.service. May 15 17:57:50.079719 kubelet[1223]: E0515 17:57:50.079572 1223 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:57:50.081242 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:57:50.081380 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:57:50.081627 systemd[1]: kubelet.service: Consumed 1.972s CPU time. May 15 17:57:50.975392 sshd[1240]: Accepted publickey for core from 172.24.4.1 port 39746 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:57:50.978027 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:57:50.988637 systemd-logind[1148]: New session 2 of user core. May 15 17:57:50.989612 systemd[1]: Started session-2.scope. May 15 17:57:51.565693 sshd[1240]: pam_unix(sshd:session): session closed for user core May 15 17:57:51.573497 systemd[1]: sshd@1-172.24.4.23:22-172.24.4.1:39746.service: Deactivated successfully. May 15 17:57:51.574899 systemd[1]: session-2.scope: Deactivated successfully. May 15 17:57:51.576436 systemd-logind[1148]: Session 2 logged out. Waiting for processes to exit. May 15 17:57:51.578571 systemd[1]: Started sshd@2-172.24.4.23:22-172.24.4.1:39754.service. May 15 17:57:51.583487 systemd-logind[1148]: Removed session 2. May 15 17:57:52.777335 sshd[1247]: Accepted publickey for core from 172.24.4.1 port 39754 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:57:52.779919 sshd[1247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:57:52.790159 systemd-logind[1148]: New session 3 of user core. May 15 17:57:52.791085 systemd[1]: Started session-3.scope. May 15 17:57:53.259326 coreos-metadata[1134]: May 15 17:57:53.259 WARN failed to locate config-drive, using the metadata service API instead May 15 17:57:53.346604 coreos-metadata[1134]: May 15 17:57:53.346 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 15 17:57:53.505921 sshd[1247]: pam_unix(sshd:session): session closed for user core May 15 17:57:53.511039 systemd[1]: sshd@2-172.24.4.23:22-172.24.4.1:39754.service: Deactivated successfully. May 15 17:57:53.512596 systemd[1]: session-3.scope: Deactivated successfully. May 15 17:57:53.513966 systemd-logind[1148]: Session 3 logged out. Waiting for processes to exit. May 15 17:57:53.515825 systemd-logind[1148]: Removed session 3. May 15 17:57:53.689720 coreos-metadata[1134]: May 15 17:57:53.689 INFO Fetch successful May 15 17:57:53.689720 coreos-metadata[1134]: May 15 17:57:53.689 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 15 17:57:53.703667 coreos-metadata[1134]: May 15 17:57:53.703 INFO Fetch successful May 15 17:57:53.710249 unknown[1134]: wrote ssh authorized keys file for user: core May 15 17:57:53.742523 update-ssh-keys[1254]: Updated "/home/core/.ssh/authorized_keys" May 15 17:57:53.743954 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 15 17:57:53.744702 systemd[1]: Reached target multi-user.target. May 15 17:57:53.747194 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 17:57:53.762944 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 17:57:53.763252 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 17:57:53.764214 systemd[1]: Startup finished in 987ms (kernel) + 7.146s (initrd) + 14.969s (userspace) = 23.103s. May 15 17:58:00.236843 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 17:58:00.237293 systemd[1]: Stopped kubelet.service. May 15 17:58:00.237379 systemd[1]: kubelet.service: Consumed 1.972s CPU time. May 15 17:58:00.240179 systemd[1]: Starting kubelet.service... May 15 17:58:00.482596 systemd[1]: Started kubelet.service. May 15 17:58:00.667297 kubelet[1260]: E0515 17:58:00.666341 1260 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:58:00.674396 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:58:00.674632 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:58:03.507503 systemd[1]: Started sshd@3-172.24.4.23:22-172.24.4.1:57088.service. May 15 17:58:04.910343 sshd[1267]: Accepted publickey for core from 172.24.4.1 port 57088 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:58:04.913663 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:58:04.923543 systemd-logind[1148]: New session 4 of user core. May 15 17:58:04.924412 systemd[1]: Started session-4.scope. May 15 17:58:05.605844 sshd[1267]: pam_unix(sshd:session): session closed for user core May 15 17:58:05.615907 systemd[1]: Started sshd@4-172.24.4.23:22-172.24.4.1:57100.service. May 15 17:58:05.617659 systemd[1]: sshd@3-172.24.4.23:22-172.24.4.1:57088.service: Deactivated successfully. May 15 17:58:05.619705 systemd[1]: session-4.scope: Deactivated successfully. May 15 17:58:05.626077 systemd-logind[1148]: Session 4 logged out. Waiting for processes to exit. May 15 17:58:05.629822 systemd-logind[1148]: Removed session 4. May 15 17:58:07.161633 sshd[1272]: Accepted publickey for core from 172.24.4.1 port 57100 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:58:07.164706 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:58:07.175893 systemd-logind[1148]: New session 5 of user core. May 15 17:58:07.177607 systemd[1]: Started session-5.scope. May 15 17:58:07.842492 sshd[1272]: pam_unix(sshd:session): session closed for user core May 15 17:58:07.848224 systemd[1]: sshd@4-172.24.4.23:22-172.24.4.1:57100.service: Deactivated successfully. May 15 17:58:07.849853 systemd[1]: session-5.scope: Deactivated successfully. May 15 17:58:07.851590 systemd-logind[1148]: Session 5 logged out. Waiting for processes to exit. May 15 17:58:07.854569 systemd[1]: Started sshd@5-172.24.4.23:22-172.24.4.1:57116.service. May 15 17:58:07.857898 systemd-logind[1148]: Removed session 5. May 15 17:58:09.393204 sshd[1279]: Accepted publickey for core from 172.24.4.1 port 57116 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:58:09.395319 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:58:09.402582 systemd[1]: Started session-6.scope. May 15 17:58:09.403153 systemd-logind[1148]: New session 6 of user core. May 15 17:58:10.127431 sshd[1279]: pam_unix(sshd:session): session closed for user core May 15 17:58:10.130024 systemd[1]: Started sshd@6-172.24.4.23:22-172.24.4.1:57120.service. May 15 17:58:10.134903 systemd[1]: sshd@5-172.24.4.23:22-172.24.4.1:57116.service: Deactivated successfully. May 15 17:58:10.135589 systemd[1]: session-6.scope: Deactivated successfully. May 15 17:58:10.136892 systemd-logind[1148]: Session 6 logged out. Waiting for processes to exit. May 15 17:58:10.138631 systemd-logind[1148]: Removed session 6. May 15 17:58:10.736681 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 17:58:10.737096 systemd[1]: Stopped kubelet.service. May 15 17:58:10.739849 systemd[1]: Starting kubelet.service... May 15 17:58:10.890541 systemd[1]: Started kubelet.service. May 15 17:58:11.145791 kubelet[1291]: E0515 17:58:11.145546 1291 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:58:11.149596 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:58:11.149959 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:58:11.459575 sshd[1284]: Accepted publickey for core from 172.24.4.1 port 57120 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:58:11.463101 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:58:11.476309 systemd[1]: Started session-7.scope. May 15 17:58:11.476891 systemd-logind[1148]: New session 7 of user core. May 15 17:58:11.922876 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 17:58:11.923576 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 17:58:11.936199 dbus-daemon[1135]: Ѝ\xf09\x92U: received setenforce notice (enforcing=2115577936) May 15 17:58:11.940886 sudo[1298]: pam_unix(sudo:session): session closed for user root May 15 17:58:12.206022 sshd[1284]: pam_unix(sshd:session): session closed for user core May 15 17:58:12.217635 systemd[1]: Started sshd@7-172.24.4.23:22-172.24.4.1:57128.service. May 15 17:58:12.219280 systemd[1]: sshd@6-172.24.4.23:22-172.24.4.1:57120.service: Deactivated successfully. May 15 17:58:12.221232 systemd[1]: session-7.scope: Deactivated successfully. May 15 17:58:12.227549 systemd-logind[1148]: Session 7 logged out. Waiting for processes to exit. May 15 17:58:12.231551 systemd-logind[1148]: Removed session 7. May 15 17:58:13.372589 sshd[1301]: Accepted publickey for core from 172.24.4.1 port 57128 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:58:13.375928 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:58:13.386429 systemd-logind[1148]: New session 8 of user core. May 15 17:58:13.387246 systemd[1]: Started session-8.scope. May 15 17:58:13.839274 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 17:58:13.839841 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 17:58:13.846444 sudo[1306]: pam_unix(sudo:session): session closed for user root May 15 17:58:13.857144 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 17:58:13.857686 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 17:58:13.878397 systemd[1]: Stopping audit-rules.service... May 15 17:58:13.878000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 17:58:13.883941 kernel: kauditd_printk_skb: 214 callbacks suppressed May 15 17:58:13.884052 kernel: audit: type=1305 audit(1747331893.878:218): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 17:58:13.878000 audit[1309]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff93896fb0 a2=420 a3=0 items=0 ppid=1 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:13.891452 auditctl[1309]: No rules May 15 17:58:13.892544 systemd[1]: audit-rules.service: Deactivated successfully. May 15 17:58:13.906308 kernel: audit: type=1300 audit(1747331893.878:218): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff93896fb0 a2=420 a3=0 items=0 ppid=1 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:13.892990 systemd[1]: Stopped audit-rules.service. May 15 17:58:13.907537 systemd[1]: Starting audit-rules.service... May 15 17:58:13.878000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 17:58:13.928330 kernel: audit: type=1327 audit(1747331893.878:218): proctitle=2F7362696E2F617564697463746C002D44 May 15 17:58:13.928437 kernel: audit: type=1131 audit(1747331893.890:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:13.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:13.943999 augenrules[1326]: No rules May 15 17:58:13.945690 systemd[1]: Finished audit-rules.service. May 15 17:58:13.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:13.947913 sudo[1305]: pam_unix(sudo:session): session closed for user root May 15 17:58:13.947000 audit[1305]: USER_END pid=1305 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:13.959183 kernel: audit: type=1130 audit(1747331893.945:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:13.959266 kernel: audit: type=1106 audit(1747331893.947:221): pid=1305 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:13.959314 kernel: audit: type=1104 audit(1747331893.947:222): pid=1305 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:13.947000 audit[1305]: CRED_DISP pid=1305 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:14.140799 sshd[1301]: pam_unix(sshd:session): session closed for user core May 15 17:58:14.144000 audit[1301]: USER_END pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:14.148826 systemd[1]: sshd@7-172.24.4.23:22-172.24.4.1:57128.service: Deactivated successfully. May 15 17:58:14.152158 systemd[1]: session-8.scope: Deactivated successfully. May 15 17:58:14.145000 audit[1301]: CRED_DISP pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:14.166036 systemd-logind[1148]: Session 8 logged out. Waiting for processes to exit. May 15 17:58:14.178886 kernel: audit: type=1106 audit(1747331894.144:223): pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:14.179004 kernel: audit: type=1104 audit(1747331894.145:224): pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:14.180521 systemd[1]: Started sshd@8-172.24.4.23:22-172.24.4.1:44028.service. May 15 17:58:14.183852 systemd-logind[1148]: Removed session 8. May 15 17:58:14.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.23:22-172.24.4.1:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:14.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.23:22-172.24.4.1:44028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:14.198771 kernel: audit: type=1131 audit(1747331894.148:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.23:22-172.24.4.1:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:15.407000 audit[1332]: USER_ACCT pid=1332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:15.409263 sshd[1332]: Accepted publickey for core from 172.24.4.1 port 44028 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 17:58:15.410000 audit[1332]: CRED_ACQ pid=1332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:15.410000 audit[1332]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefdde80b0 a2=3 a3=0 items=0 ppid=1 pid=1332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:15.410000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 17:58:15.412407 sshd[1332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:58:15.422700 systemd-logind[1148]: New session 9 of user core. May 15 17:58:15.423624 systemd[1]: Started session-9.scope. May 15 17:58:15.434000 audit[1332]: USER_START pid=1332 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:15.437000 audit[1334]: CRED_ACQ pid=1334 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:15.759000 audit[1335]: USER_ACCT pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:15.760968 sudo[1335]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 17:58:15.760000 audit[1335]: CRED_REFR pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:15.762261 sudo[1335]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 17:58:15.765000 audit[1335]: USER_START pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:15.835376 systemd[1]: Starting docker.service... May 15 17:58:15.928491 env[1345]: time="2025-05-15T17:58:15.928440522Z" level=info msg="Starting up" May 15 17:58:15.930244 env[1345]: time="2025-05-15T17:58:15.930222765Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 17:58:15.930333 env[1345]: time="2025-05-15T17:58:15.930317488Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 17:58:15.930417 env[1345]: time="2025-05-15T17:58:15.930393811Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 17:58:15.930479 env[1345]: time="2025-05-15T17:58:15.930465576Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 17:58:15.933682 env[1345]: time="2025-05-15T17:58:15.933632100Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 17:58:15.933812 env[1345]: time="2025-05-15T17:58:15.933677854Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 17:58:15.933812 env[1345]: time="2025-05-15T17:58:15.933710567Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 17:58:15.933812 env[1345]: time="2025-05-15T17:58:15.933760256Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 17:58:15.943881 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3758060965-merged.mount: Deactivated successfully. May 15 17:58:15.995071 env[1345]: time="2025-05-15T17:58:15.994396632Z" level=info msg="Loading containers: start." May 15 17:58:16.091000 audit[1376]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.091000 audit[1376]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffee6bc5370 a2=0 a3=7ffee6bc535c items=0 ppid=1345 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 17:58:16.095000 audit[1378]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.095000 audit[1378]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc817f0d80 a2=0 a3=7ffc817f0d6c items=0 ppid=1345 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 17:58:16.099000 audit[1380]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.099000 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd81d508d0 a2=0 a3=7ffd81d508bc items=0 ppid=1345 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 17:58:16.103000 audit[1382]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.103000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc603a5000 a2=0 a3=7ffc603a4fec items=0 ppid=1345 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.103000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 17:58:16.109000 audit[1384]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.109000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc78d58f20 a2=0 a3=7ffc78d58f0c items=0 ppid=1345 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 17:58:16.134000 audit[1389]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.134000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff78402470 a2=0 a3=7fff7840245c items=0 ppid=1345 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 17:58:16.151000 audit[1391]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.151000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc398db7d0 a2=0 a3=7ffc398db7bc items=0 ppid=1345 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.151000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 17:58:16.154000 audit[1393]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.154000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd47477ed0 a2=0 a3=7ffd47477ebc items=0 ppid=1345 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 17:58:16.158000 audit[1395]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.158000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff05f45100 a2=0 a3=7fff05f450ec items=0 ppid=1345 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 17:58:16.171000 audit[1399]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.171000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc1bef3dc0 a2=0 a3=7ffc1bef3dac items=0 ppid=1345 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 17:58:16.176000 audit[1400]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.176000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffc5499230 a2=0 a3=7fffc549921c items=0 ppid=1345 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 17:58:16.202861 kernel: Initializing XFRM netlink socket May 15 17:58:16.325103 env[1345]: time="2025-05-15T17:58:16.325025615Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 17:58:16.413000 audit[1408]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.413000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffd96cc900 a2=0 a3=7fffd96cc8ec items=0 ppid=1345 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.413000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 17:58:16.432000 audit[1411]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.432000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe7b1d5b10 a2=0 a3=7ffe7b1d5afc items=0 ppid=1345 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.432000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 17:58:16.437000 audit[1414]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.437000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd84cea700 a2=0 a3=7ffd84cea6ec items=0 ppid=1345 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.437000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 17:58:16.440000 audit[1416]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.440000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc3ad39470 a2=0 a3=7ffc3ad3945c items=0 ppid=1345 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.440000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 17:58:16.444000 audit[1418]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.444000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd7bb958a0 a2=0 a3=7ffd7bb9588c items=0 ppid=1345 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.444000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 17:58:16.449000 audit[1420]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.449000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcb2931ab0 a2=0 a3=7ffcb2931a9c items=0 ppid=1345 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 17:58:16.453000 audit[1422]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.453000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdf290c5a0 a2=0 a3=7ffdf290c58c items=0 ppid=1345 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.453000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 17:58:16.473000 audit[1425]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.473000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff7da93460 a2=0 a3=7fff7da9344c items=0 ppid=1345 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.473000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 17:58:16.478000 audit[1427]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.478000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd4fd8dec0 a2=0 a3=7ffd4fd8deac items=0 ppid=1345 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.478000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 17:58:16.482000 audit[1429]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.482000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff20db1040 a2=0 a3=7fff20db102c items=0 ppid=1345 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.482000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 17:58:16.487000 audit[1431]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.487000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd9c2aca10 a2=0 a3=7ffd9c2ac9fc items=0 ppid=1345 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.487000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 17:58:16.489017 systemd-networkd[980]: docker0: Link UP May 15 17:58:16.509000 audit[1435]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.509000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeaedea130 a2=0 a3=7ffeaedea11c items=0 ppid=1345 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.509000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 17:58:16.515000 audit[1436]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:16.515000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcd0376bf0 a2=0 a3=7ffcd0376bdc items=0 ppid=1345 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:16.515000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 17:58:16.516586 env[1345]: time="2025-05-15T17:58:16.516500096Z" level=info msg="Loading containers: done." May 15 17:58:16.542044 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4217585199-merged.mount: Deactivated successfully. May 15 17:58:16.555032 env[1345]: time="2025-05-15T17:58:16.554929762Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 17:58:16.555938 env[1345]: time="2025-05-15T17:58:16.555898870Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 17:58:16.556448 env[1345]: time="2025-05-15T17:58:16.556375736Z" level=info msg="Daemon has completed initialization" May 15 17:58:16.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:16.594176 systemd[1]: Started docker.service. May 15 17:58:16.606581 env[1345]: time="2025-05-15T17:58:16.606490869Z" level=info msg="API listen on /run/docker.sock" May 15 17:58:19.116475 env[1156]: time="2025-05-15T17:58:19.116343467Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.13\"" May 15 17:58:19.841931 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1930288604.mount: Deactivated successfully. May 15 17:58:21.236854 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 15 17:58:21.237300 systemd[1]: Stopped kubelet.service. May 15 17:58:21.244081 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 17:58:21.244132 kernel: audit: type=1130 audit(1747331901.236:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:21.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:21.239728 systemd[1]: Starting kubelet.service... May 15 17:58:21.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:21.251760 kernel: audit: type=1131 audit(1747331901.236:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:21.367051 systemd[1]: Started kubelet.service. May 15 17:58:21.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:21.372751 kernel: audit: type=1130 audit(1747331901.366:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:21.437792 kubelet[1480]: E0515 17:58:21.437725 1480 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:58:21.439153 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:58:21.439293 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:58:21.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 17:58:21.445772 kernel: audit: type=1131 audit(1747331901.438:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 17:58:22.504485 env[1156]: time="2025-05-15T17:58:22.504390246Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:22.508135 env[1156]: time="2025-05-15T17:58:22.508080999Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e60416bd78b656386379ee8480d56e4d690894f5599d2f8d730a9cd3d623b295,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:22.511492 env[1156]: time="2025-05-15T17:58:22.511443400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:22.514857 env[1156]: time="2025-05-15T17:58:22.514806314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:bd68d81c20ad5781adec9f6eae24c83d6f66c3afc0d4baa32d3f2d865c82d436,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:22.516298 env[1156]: time="2025-05-15T17:58:22.516238449Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.13\" returns image reference \"sha256:e60416bd78b656386379ee8480d56e4d690894f5599d2f8d730a9cd3d623b295\"" May 15 17:58:22.529358 env[1156]: time="2025-05-15T17:58:22.529258654Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.13\"" May 15 17:58:25.324330 env[1156]: time="2025-05-15T17:58:25.324249817Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:25.327273 env[1156]: time="2025-05-15T17:58:25.327199973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c32cfb72baccb9a9a580a5529d9ea50cc7802786b043a597137df96b989d492e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:25.330685 env[1156]: time="2025-05-15T17:58:25.330634069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:25.333614 env[1156]: time="2025-05-15T17:58:25.333589342Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:b85a5d785cc00b03613f67a7afca1e91b2a0ccf4ced8e69d38bda5f686980f3f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:25.335136 env[1156]: time="2025-05-15T17:58:25.335110806Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.13\" returns image reference \"sha256:c32cfb72baccb9a9a580a5529d9ea50cc7802786b043a597137df96b989d492e\"" May 15 17:58:25.354192 env[1156]: time="2025-05-15T17:58:25.354132912Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.13\"" May 15 17:58:27.724333 env[1156]: time="2025-05-15T17:58:27.723480296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:27.754602 env[1156]: time="2025-05-15T17:58:27.754472765Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:12675fc0a409da048d01de9db1b984a2dc0f3cc40081eced95bffb2a32e7aa52,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:27.793326 env[1156]: time="2025-05-15T17:58:27.793238619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:27.873610 env[1156]: time="2025-05-15T17:58:27.873521384Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bfa5f10dc3e14316785f23f8e1f4e4dbc556b033270d91185fca0577353cad33,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:27.876969 env[1156]: time="2025-05-15T17:58:27.876165682Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.13\" returns image reference \"sha256:12675fc0a409da048d01de9db1b984a2dc0f3cc40081eced95bffb2a32e7aa52\"" May 15 17:58:27.902239 env[1156]: time="2025-05-15T17:58:27.902128981Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.13\"" May 15 17:58:29.842523 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount615321264.mount: Deactivated successfully. May 15 17:58:30.752073 env[1156]: time="2025-05-15T17:58:30.751966209Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:30.756025 env[1156]: time="2025-05-15T17:58:30.755928563Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a6946560b0b088b01f40a556d2a76b533da279a3388986e087fae04b73f8ad24,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:30.760464 env[1156]: time="2025-05-15T17:58:30.760374818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:30.764308 env[1156]: time="2025-05-15T17:58:30.764240912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f68590d1921db1f9a9b56898a66cf3c67fcdcb5be132f7640af8ac1297371e4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:30.766497 env[1156]: time="2025-05-15T17:58:30.765454656Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.13\" returns image reference \"sha256:a6946560b0b088b01f40a556d2a76b533da279a3388986e087fae04b73f8ad24\"" May 15 17:58:30.789267 env[1156]: time="2025-05-15T17:58:30.789149675Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 17:58:31.466080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2133461534.mount: Deactivated successfully. May 15 17:58:31.468675 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 15 17:58:31.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:31.469093 systemd[1]: Stopped kubelet.service. May 15 17:58:31.481849 kernel: audit: type=1130 audit(1747331911.468:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:31.472669 systemd[1]: Starting kubelet.service... May 15 17:58:31.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:31.495758 kernel: audit: type=1131 audit(1747331911.468:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:31.581872 systemd[1]: Started kubelet.service. May 15 17:58:31.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:31.587800 kernel: audit: type=1130 audit(1747331911.581:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:31.677647 update_engine[1149]: I0515 17:58:31.677490 1149 update_attempter.cc:509] Updating boot flags... May 15 17:58:31.973047 kubelet[1512]: E0515 17:58:31.972969 1512 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:58:31.974964 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:58:31.975120 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:58:31.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 17:58:31.984869 kernel: audit: type=1131 audit(1747331911.974:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 17:58:33.473319 env[1156]: time="2025-05-15T17:58:33.473151216Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:33.478159 env[1156]: time="2025-05-15T17:58:33.478111109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:33.489370 env[1156]: time="2025-05-15T17:58:33.489293579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:33.497394 env[1156]: time="2025-05-15T17:58:33.497313118Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:33.498044 env[1156]: time="2025-05-15T17:58:33.497991374Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 17:58:33.514481 env[1156]: time="2025-05-15T17:58:33.514405545Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 15 17:58:34.151882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3703497243.mount: Deactivated successfully. May 15 17:58:34.167355 env[1156]: time="2025-05-15T17:58:34.167188416Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:34.172078 env[1156]: time="2025-05-15T17:58:34.171999968Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:34.175948 env[1156]: time="2025-05-15T17:58:34.175875837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:34.179669 env[1156]: time="2025-05-15T17:58:34.179600244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:34.181436 env[1156]: time="2025-05-15T17:58:34.181364156Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 15 17:58:34.204100 env[1156]: time="2025-05-15T17:58:34.203997935Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 15 17:58:34.843622 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount994748439.mount: Deactivated successfully. May 15 17:58:39.282906 env[1156]: time="2025-05-15T17:58:39.282772583Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:39.286654 env[1156]: time="2025-05-15T17:58:39.286596631Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:39.292066 env[1156]: time="2025-05-15T17:58:39.291972682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:39.297298 env[1156]: time="2025-05-15T17:58:39.297241859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:39.299978 env[1156]: time="2025-05-15T17:58:39.299901348Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 15 17:58:41.986793 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 15 17:58:41.987247 systemd[1]: Stopped kubelet.service. May 15 17:58:41.992794 kernel: audit: type=1130 audit(1747331921.985:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:41.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:41.990455 systemd[1]: Starting kubelet.service... May 15 17:58:41.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:41.998821 kernel: audit: type=1131 audit(1747331921.985:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:42.118694 systemd[1]: Started kubelet.service. May 15 17:58:42.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:42.124752 kernel: audit: type=1130 audit(1747331922.117:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:42.417301 kubelet[1613]: E0515 17:58:42.417118 1613 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:58:42.418676 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:58:42.418869 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:58:42.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 17:58:42.424778 kernel: audit: type=1131 audit(1747331922.417:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 17:58:42.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:42.851095 systemd[1]: Stopped kubelet.service. May 15 17:58:42.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:42.861024 kernel: audit: type=1130 audit(1747331922.849:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:42.861136 kernel: audit: type=1131 audit(1747331922.849:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:42.863105 systemd[1]: Starting kubelet.service... May 15 17:58:42.904287 systemd[1]: Reloading. May 15 17:58:43.052010 /usr/lib/systemd/system-generators/torcx-generator[1651]: time="2025-05-15T17:58:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 17:58:43.052040 /usr/lib/systemd/system-generators/torcx-generator[1651]: time="2025-05-15T17:58:43Z" level=info msg="torcx already run" May 15 17:58:43.136776 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 17:58:43.136796 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 17:58:43.159531 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 17:58:43.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249993 kernel: audit: type=1400 audit(1747331923.228:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250124 kernel: audit: type=1400 audit(1747331923.228:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250194 kernel: audit: type=1400 audit(1747331923.238:276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250250 kernel: audit: type=1400 audit(1747331923.238:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.238000 audit: BPF prog-id=46 op=LOAD May 15 17:58:43.238000 audit: BPF prog-id=30 op=UNLOAD May 15 17:58:43.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit: BPF prog-id=47 op=LOAD May 15 17:58:43.249000 audit: BPF prog-id=39 op=UNLOAD May 15 17:58:43.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit: BPF prog-id=48 op=LOAD May 15 17:58:43.250000 audit: BPF prog-id=31 op=UNLOAD May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit: BPF prog-id=49 op=LOAD May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit: BPF prog-id=50 op=LOAD May 15 17:58:43.250000 audit: BPF prog-id=32 op=UNLOAD May 15 17:58:43.250000 audit: BPF prog-id=33 op=UNLOAD May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit: BPF prog-id=51 op=LOAD May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.250000 audit: BPF prog-id=52 op=LOAD May 15 17:58:43.250000 audit: BPF prog-id=34 op=UNLOAD May 15 17:58:43.250000 audit: BPF prog-id=35 op=UNLOAD May 15 17:58:43.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.251000 audit: BPF prog-id=53 op=LOAD May 15 17:58:43.252000 audit: BPF prog-id=41 op=UNLOAD May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit: BPF prog-id=54 op=LOAD May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit: BPF prog-id=55 op=LOAD May 15 17:58:43.252000 audit: BPF prog-id=42 op=UNLOAD May 15 17:58:43.252000 audit: BPF prog-id=43 op=UNLOAD May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit: BPF prog-id=56 op=LOAD May 15 17:58:43.252000 audit: BPF prog-id=44 op=UNLOAD May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit: BPF prog-id=57 op=LOAD May 15 17:58:43.253000 audit: BPF prog-id=36 op=UNLOAD May 15 17:58:43.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:43.256000 audit: BPF prog-id=60 op=LOAD May 15 17:58:43.256000 audit: BPF prog-id=40 op=UNLOAD May 15 17:58:43.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:43.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:43.275030 systemd[1]: Started kubelet.service. May 15 17:58:43.278931 systemd[1]: Stopping kubelet.service... May 15 17:58:43.279475 systemd[1]: kubelet.service: Deactivated successfully. May 15 17:58:43.279658 systemd[1]: Stopped kubelet.service. May 15 17:58:43.281258 systemd[1]: Starting kubelet.service... May 15 17:58:43.379626 systemd[1]: Started kubelet.service. May 15 17:58:43.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:43.737605 kubelet[1699]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 17:58:43.737605 kubelet[1699]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 17:58:43.737605 kubelet[1699]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 17:58:43.738510 kubelet[1699]: I0515 17:58:43.737654 1699 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 17:58:44.375760 kubelet[1699]: I0515 17:58:44.375691 1699 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 17:58:44.376062 kubelet[1699]: I0515 17:58:44.376047 1699 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 17:58:44.376532 kubelet[1699]: I0515 17:58:44.376516 1699 server.go:927] "Client rotation is on, will bootstrap in background" May 15 17:58:44.424817 kubelet[1699]: I0515 17:58:44.424720 1699 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 17:58:44.426088 kubelet[1699]: E0515 17:58:44.425968 1699 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.23:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.455297 kubelet[1699]: I0515 17:58:44.455250 1699 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 17:58:44.460407 kubelet[1699]: I0515 17:58:44.460340 1699 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 17:58:44.461081 kubelet[1699]: I0515 17:58:44.460554 1699 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-100-3e5a09d652.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 17:58:44.461454 kubelet[1699]: I0515 17:58:44.461425 1699 topology_manager.go:138] "Creating topology manager with none policy" May 15 17:58:44.461611 kubelet[1699]: I0515 17:58:44.461590 1699 container_manager_linux.go:301] "Creating device plugin manager" May 15 17:58:44.462036 kubelet[1699]: I0515 17:58:44.462007 1699 state_mem.go:36] "Initialized new in-memory state store" May 15 17:58:44.464358 kubelet[1699]: I0515 17:58:44.464326 1699 kubelet.go:400] "Attempting to sync node with API server" May 15 17:58:44.464530 kubelet[1699]: I0515 17:58:44.464506 1699 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 17:58:44.464725 kubelet[1699]: I0515 17:58:44.464702 1699 kubelet.go:312] "Adding apiserver pod source" May 15 17:58:44.464993 kubelet[1699]: I0515 17:58:44.464959 1699 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 17:58:44.473050 kubelet[1699]: W0515 17:58:44.472962 1699 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-100-3e5a09d652.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.473319 kubelet[1699]: E0515 17:58:44.473257 1699 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-100-3e5a09d652.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.476809 kubelet[1699]: W0515 17:58:44.476690 1699 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.23:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.477019 kubelet[1699]: E0515 17:58:44.476993 1699 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.23:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.479053 kubelet[1699]: I0515 17:58:44.477998 1699 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 17:58:44.488915 kubelet[1699]: I0515 17:58:44.488867 1699 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 17:58:44.489055 kubelet[1699]: W0515 17:58:44.488979 1699 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 17:58:44.490609 kubelet[1699]: I0515 17:58:44.490177 1699 server.go:1264] "Started kubelet" May 15 17:58:44.510000 audit[1699]: AVC avc: denied { mac_admin } for pid=1699 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:44.510000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:58:44.510000 audit[1699]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000af68d0 a1=c0006255d8 a2=c000af68a0 a3=25 items=0 ppid=1 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.510000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:58:44.510000 audit[1699]: AVC avc: denied { mac_admin } for pid=1699 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:44.510000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:58:44.510000 audit[1699]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a3ce40 a1=c0006255f0 a2=c000af6960 a3=25 items=0 ppid=1 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.510000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:58:44.513398 kubelet[1699]: I0515 17:58:44.512309 1699 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 17:58:44.513398 kubelet[1699]: I0515 17:58:44.512392 1699 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 17:58:44.513398 kubelet[1699]: I0515 17:58:44.512524 1699 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 17:58:44.516000 audit[1710]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:44.516000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff2a5a53d0 a2=0 a3=7fff2a5a53bc items=0 ppid=1699 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 17:58:44.519000 audit[1711]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:44.519000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2112f980 a2=0 a3=7fff2112f96c items=0 ppid=1699 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 17:58:44.524976 kubelet[1699]: I0515 17:58:44.524897 1699 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 17:58:44.528306 kubelet[1699]: I0515 17:58:44.528261 1699 server.go:455] "Adding debug handlers to kubelet server" May 15 17:58:44.532584 kubelet[1699]: I0515 17:58:44.532532 1699 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 17:58:44.533143 kubelet[1699]: E0515 17:58:44.532827 1699 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.23:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.23:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-100-3e5a09d652.novalocal.183fc520a7ef268e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-100-3e5a09d652.novalocal,UID:ci-3510-3-100-3e5a09d652.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-100-3e5a09d652.novalocal,},FirstTimestamp:2025-05-15 17:58:44.490135182 +0000 UTC m=+1.104361059,LastTimestamp:2025-05-15 17:58:44.490135182 +0000 UTC m=+1.104361059,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-100-3e5a09d652.novalocal,}" May 15 17:58:44.534472 kubelet[1699]: I0515 17:58:44.534380 1699 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 17:58:44.535079 kubelet[1699]: I0515 17:58:44.535046 1699 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 17:58:44.533000 audit[1713]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:44.533000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd334ec30 a2=0 a3=7fffd334ec1c items=0 ppid=1699 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 17:58:44.537033 kubelet[1699]: E0515 17:58:44.536962 1699 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-100-3e5a09d652.novalocal?timeout=10s\": dial tcp 172.24.4.23:6443: connect: connection refused" interval="200ms" May 15 17:58:44.537393 kubelet[1699]: I0515 17:58:44.537355 1699 reconciler.go:26] "Reconciler: start to sync state" May 15 17:58:44.537643 kubelet[1699]: I0515 17:58:44.537615 1699 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 17:58:44.538674 kubelet[1699]: W0515 17:58:44.538593 1699 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.538937 kubelet[1699]: E0515 17:58:44.538910 1699 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.539917 kubelet[1699]: I0515 17:58:44.539884 1699 factory.go:221] Registration of the systemd container factory successfully May 15 17:58:44.540214 kubelet[1699]: I0515 17:58:44.540175 1699 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 17:58:44.542551 kubelet[1699]: E0515 17:58:44.542496 1699 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 17:58:44.541000 audit[1715]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:44.541000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc85b7c730 a2=0 a3=7ffc85b7c71c items=0 ppid=1699 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 17:58:44.544030 kubelet[1699]: I0515 17:58:44.543997 1699 factory.go:221] Registration of the containerd container factory successfully May 15 17:58:44.556000 audit[1718]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:44.556000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffe170ee90 a2=0 a3=7fffe170ee7c items=0 ppid=1699 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 17:58:44.558480 kubelet[1699]: I0515 17:58:44.558412 1699 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 17:58:44.557000 audit[1720]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:58:44.557000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdb46132d0 a2=0 a3=7ffdb46132bc items=0 ppid=1699 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 17:58:44.559921 kubelet[1699]: I0515 17:58:44.559889 1699 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 17:58:44.559921 kubelet[1699]: I0515 17:58:44.559920 1699 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 17:58:44.560001 kubelet[1699]: I0515 17:58:44.559941 1699 kubelet.go:2337] "Starting kubelet main sync loop" May 15 17:58:44.560001 kubelet[1699]: E0515 17:58:44.559984 1699 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 17:58:44.559000 audit[1721]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:44.559000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc83fb11b0 a2=0 a3=7ffc83fb119c items=0 ppid=1699 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 17:58:44.560000 audit[1722]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:44.560000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea63cbde0 a2=0 a3=7ffea63cbdcc items=0 ppid=1699 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 17:58:44.561000 audit[1723]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:58:44.561000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9aef3ee0 a2=0 a3=7ffe9aef3ecc items=0 ppid=1699 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 17:58:44.562000 audit[1724]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:58:44.562000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde3d177f0 a2=0 a3=7ffde3d177dc items=0 ppid=1699 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 17:58:44.563000 audit[1725]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:58:44.563000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff7e541fa0 a2=0 a3=7fff7e541f8c items=0 ppid=1699 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 17:58:44.564000 audit[1726]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:58:44.564000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff221dd000 a2=0 a3=7fff221dcfec items=0 ppid=1699 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 17:58:44.567866 kubelet[1699]: W0515 17:58:44.567797 1699 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.567925 kubelet[1699]: E0515 17:58:44.567871 1699 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:44.590712 kubelet[1699]: I0515 17:58:44.590687 1699 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 17:58:44.590898 kubelet[1699]: I0515 17:58:44.590886 1699 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 17:58:44.590965 kubelet[1699]: I0515 17:58:44.590955 1699 state_mem.go:36] "Initialized new in-memory state store" May 15 17:58:44.595712 kubelet[1699]: I0515 17:58:44.595699 1699 policy_none.go:49] "None policy: Start" May 15 17:58:44.596564 kubelet[1699]: I0515 17:58:44.596551 1699 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 17:58:44.596637 kubelet[1699]: I0515 17:58:44.596628 1699 state_mem.go:35] "Initializing new in-memory state store" May 15 17:58:44.608230 systemd[1]: Created slice kubepods.slice. May 15 17:58:44.612958 systemd[1]: Created slice kubepods-burstable.slice. May 15 17:58:44.616515 systemd[1]: Created slice kubepods-besteffort.slice. May 15 17:58:44.621426 kubelet[1699]: I0515 17:58:44.621401 1699 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 17:58:44.619000 audit[1699]: AVC avc: denied { mac_admin } for pid=1699 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:44.619000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:58:44.619000 audit[1699]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000db7a70 a1=c000ea6360 a2=c000db7a40 a3=25 items=0 ppid=1 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:44.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:58:44.621865 kubelet[1699]: I0515 17:58:44.621850 1699 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 17:58:44.622063 kubelet[1699]: I0515 17:58:44.622020 1699 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 17:58:44.622244 kubelet[1699]: I0515 17:58:44.622233 1699 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 17:58:44.625238 kubelet[1699]: E0515 17:58:44.625222 1699 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-100-3e5a09d652.novalocal\" not found" May 15 17:58:44.639797 kubelet[1699]: I0515 17:58:44.635357 1699 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.639797 kubelet[1699]: E0515 17:58:44.635828 1699 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.23:6443/api/v1/nodes\": dial tcp 172.24.4.23:6443: connect: connection refused" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.660431 kubelet[1699]: I0515 17:58:44.660377 1699 topology_manager.go:215] "Topology Admit Handler" podUID="1eb00da8aee05ced7cb5f755c2097893" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.662363 kubelet[1699]: I0515 17:58:44.662341 1699 topology_manager.go:215] "Topology Admit Handler" podUID="1bb9d88c081f8e650c7afd9cbada7dfd" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.663643 kubelet[1699]: I0515 17:58:44.663592 1699 topology_manager.go:215] "Topology Admit Handler" podUID="cb1ac25d0c1b1ed395953583f7ac093c" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.670850 systemd[1]: Created slice kubepods-burstable-pod1eb00da8aee05ced7cb5f755c2097893.slice. May 15 17:58:44.678184 systemd[1]: Created slice kubepods-burstable-pod1bb9d88c081f8e650c7afd9cbada7dfd.slice. May 15 17:58:44.683021 systemd[1]: Created slice kubepods-burstable-podcb1ac25d0c1b1ed395953583f7ac093c.slice. May 15 17:58:44.738650 kubelet[1699]: E0515 17:58:44.738560 1699 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-100-3e5a09d652.novalocal?timeout=10s\": dial tcp 172.24.4.23:6443: connect: connection refused" interval="400ms" May 15 17:58:44.739695 kubelet[1699]: I0515 17:58:44.739631 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1eb00da8aee05ced7cb5f755c2097893-k8s-certs\") pod \"kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1eb00da8aee05ced7cb5f755c2097893\") " pod="kube-system/kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.740025 kubelet[1699]: I0515 17:58:44.739974 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-ca-certs\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.740369 kubelet[1699]: I0515 17:58:44.740332 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.740679 kubelet[1699]: I0515 17:58:44.740645 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.742187 kubelet[1699]: I0515 17:58:44.741013 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.742512 kubelet[1699]: I0515 17:58:44.742477 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/cb1ac25d0c1b1ed395953583f7ac093c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"cb1ac25d0c1b1ed395953583f7ac093c\") " pod="kube-system/kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.742934 kubelet[1699]: I0515 17:58:44.742889 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1eb00da8aee05ced7cb5f755c2097893-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1eb00da8aee05ced7cb5f755c2097893\") " pod="kube-system/kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.743267 kubelet[1699]: I0515 17:58:44.743229 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.743580 kubelet[1699]: I0515 17:58:44.743546 1699 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1eb00da8aee05ced7cb5f755c2097893-ca-certs\") pod \"kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1eb00da8aee05ced7cb5f755c2097893\") " pod="kube-system/kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.840007 kubelet[1699]: I0515 17:58:44.839933 1699 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.840716 kubelet[1699]: E0515 17:58:44.840655 1699 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.23:6443/api/v1/nodes\": dial tcp 172.24.4.23:6443: connect: connection refused" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:44.980654 env[1156]: time="2025-05-15T17:58:44.980440532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal,Uid:1eb00da8aee05ced7cb5f755c2097893,Namespace:kube-system,Attempt:0,}" May 15 17:58:44.983917 env[1156]: time="2025-05-15T17:58:44.983696257Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal,Uid:1bb9d88c081f8e650c7afd9cbada7dfd,Namespace:kube-system,Attempt:0,}" May 15 17:58:44.987261 env[1156]: time="2025-05-15T17:58:44.987077811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal,Uid:cb1ac25d0c1b1ed395953583f7ac093c,Namespace:kube-system,Attempt:0,}" May 15 17:58:45.140946 kubelet[1699]: E0515 17:58:45.140844 1699 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-100-3e5a09d652.novalocal?timeout=10s\": dial tcp 172.24.4.23:6443: connect: connection refused" interval="800ms" May 15 17:58:45.244600 kubelet[1699]: I0515 17:58:45.244022 1699 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:45.244600 kubelet[1699]: E0515 17:58:45.244540 1699 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.23:6443/api/v1/nodes\": dial tcp 172.24.4.23:6443: connect: connection refused" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:45.587879 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount587714317.mount: Deactivated successfully. May 15 17:58:45.603627 env[1156]: time="2025-05-15T17:58:45.603541338Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.610391 env[1156]: time="2025-05-15T17:58:45.610316738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.614701 env[1156]: time="2025-05-15T17:58:45.614564904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.617945 env[1156]: time="2025-05-15T17:58:45.617840973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.621996 env[1156]: time="2025-05-15T17:58:45.621938843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.630157 env[1156]: time="2025-05-15T17:58:45.630091324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.632539 env[1156]: time="2025-05-15T17:58:45.632456931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.644928 env[1156]: time="2025-05-15T17:58:45.644872454Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.662900 env[1156]: time="2025-05-15T17:58:45.662689512Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.666356 env[1156]: time="2025-05-15T17:58:45.666225198Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.668979 kubelet[1699]: W0515 17:58:45.668810 1699 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.23:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:45.668979 kubelet[1699]: E0515 17:58:45.668939 1699 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.23:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:45.683118 env[1156]: time="2025-05-15T17:58:45.682439101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.685403 env[1156]: time="2025-05-15T17:58:45.684652398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:58:45.703474 env[1156]: time="2025-05-15T17:58:45.703337070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:58:45.703922 env[1156]: time="2025-05-15T17:58:45.703524535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:58:45.703922 env[1156]: time="2025-05-15T17:58:45.703652931Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:58:45.704491 env[1156]: time="2025-05-15T17:58:45.704291525Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5562338c4a2eebe4fc9aa15e6c5a668f4d646ea73e14f986c9fe775976a8ef02 pid=1737 runtime=io.containerd.runc.v2 May 15 17:58:45.729707 systemd[1]: Started cri-containerd-5562338c4a2eebe4fc9aa15e6c5a668f4d646ea73e14f986c9fe775976a8ef02.scope. May 15 17:58:45.735554 kubelet[1699]: W0515 17:58:45.731151 1699 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-100-3e5a09d652.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:45.735554 kubelet[1699]: E0515 17:58:45.731239 1699 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.23:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-100-3e5a09d652.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:45.747904 env[1156]: time="2025-05-15T17:58:45.744960622Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:58:45.747904 env[1156]: time="2025-05-15T17:58:45.744997190Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:58:45.747904 env[1156]: time="2025-05-15T17:58:45.745031603Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:58:45.747904 env[1156]: time="2025-05-15T17:58:45.745159909Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69d1861aaa5d7105116e7a63c399a0bc70857ae492927b5d26345ee5c8e647bd pid=1774 runtime=io.containerd.runc.v2 May 15 17:58:45.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.751000 audit: BPF prog-id=61 op=LOAD May 15 17:58:45.752000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1737 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363233333863346132656562653466633961613135653663356136 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1737 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363233333863346132656562653466633961613135653663356136 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.752000 audit: BPF prog-id=62 op=LOAD May 15 17:58:45.752000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000303050 items=0 ppid=1737 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363233333863346132656562653466633961613135653663356136 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.753000 audit: BPF prog-id=63 op=LOAD May 15 17:58:45.753000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000303098 items=0 ppid=1737 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363233333863346132656562653466633961613135653663356136 May 15 17:58:45.755000 audit: BPF prog-id=63 op=UNLOAD May 15 17:58:45.755000 audit: BPF prog-id=62 op=UNLOAD May 15 17:58:45.755000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.755000 audit: BPF prog-id=64 op=LOAD May 15 17:58:45.755000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003034a8 items=0 ppid=1737 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363233333863346132656562653466633961613135653663356136 May 15 17:58:45.762892 env[1156]: time="2025-05-15T17:58:45.762817484Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:58:45.763088 env[1156]: time="2025-05-15T17:58:45.763065570Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:58:45.763168 env[1156]: time="2025-05-15T17:58:45.763147220Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:58:45.763368 env[1156]: time="2025-05-15T17:58:45.763343601Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/534cca223f258f98f27c32fd70b534852e0af111937feef1dc7d00f9a47b8f6f pid=1788 runtime=io.containerd.runc.v2 May 15 17:58:45.783548 systemd[1]: Started cri-containerd-69d1861aaa5d7105116e7a63c399a0bc70857ae492927b5d26345ee5c8e647bd.scope. May 15 17:58:45.797523 systemd[1]: Started cri-containerd-534cca223f258f98f27c32fd70b534852e0af111937feef1dc7d00f9a47b8f6f.scope. May 15 17:58:45.809625 env[1156]: time="2025-05-15T17:58:45.809564951Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal,Uid:1eb00da8aee05ced7cb5f755c2097893,Namespace:kube-system,Attempt:0,} returns sandbox id \"5562338c4a2eebe4fc9aa15e6c5a668f4d646ea73e14f986c9fe775976a8ef02\"" May 15 17:58:45.814852 env[1156]: time="2025-05-15T17:58:45.814810880Z" level=info msg="CreateContainer within sandbox \"5562338c4a2eebe4fc9aa15e6c5a668f4d646ea73e14f986c9fe775976a8ef02\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 17:58:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.824000 audit: BPF prog-id=65 op=LOAD May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1774 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643138363161616135643731303531313665376136336333393961 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1774 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643138363161616135643731303531313665376136336333393961 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit: BPF prog-id=66 op=LOAD May 15 17:58:45.825000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000249480 items=0 ppid=1774 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643138363161616135643731303531313665376136336333393961 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit: BPF prog-id=67 op=LOAD May 15 17:58:45.825000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002494c8 items=0 ppid=1774 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643138363161616135643731303531313665376136336333393961 May 15 17:58:45.825000 audit: BPF prog-id=67 op=UNLOAD May 15 17:58:45.825000 audit: BPF prog-id=66 op=UNLOAD May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.825000 audit: BPF prog-id=68 op=LOAD May 15 17:58:45.825000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002498d8 items=0 ppid=1774 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643138363161616135643731303531313665376136336333393961 May 15 17:58:45.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit: BPF prog-id=69 op=LOAD May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346363613232336632353866393866323763333266643730623533 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346363613232336632353866393866323763333266643730623533 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit: BPF prog-id=70 op=LOAD May 15 17:58:45.829000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c1130 items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346363613232336632353866393866323763333266643730623533 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit: BPF prog-id=71 op=LOAD May 15 17:58:45.829000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c1178 items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346363613232336632353866393866323763333266643730623533 May 15 17:58:45.829000 audit: BPF prog-id=71 op=UNLOAD May 15 17:58:45.829000 audit: BPF prog-id=70 op=UNLOAD May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:45.829000 audit: BPF prog-id=72 op=LOAD May 15 17:58:45.829000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c1588 items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:45.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533346363613232336632353866393866323763333266643730623533 May 15 17:58:45.848687 kubelet[1699]: W0515 17:58:45.848566 1699 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:45.848687 kubelet[1699]: E0515 17:58:45.848640 1699 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.23:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:45.871496 env[1156]: time="2025-05-15T17:58:45.871448791Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal,Uid:1bb9d88c081f8e650c7afd9cbada7dfd,Namespace:kube-system,Attempt:0,} returns sandbox id \"534cca223f258f98f27c32fd70b534852e0af111937feef1dc7d00f9a47b8f6f\"" May 15 17:58:45.874939 env[1156]: time="2025-05-15T17:58:45.874870819Z" level=info msg="CreateContainer within sandbox \"534cca223f258f98f27c32fd70b534852e0af111937feef1dc7d00f9a47b8f6f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 17:58:45.881494 env[1156]: time="2025-05-15T17:58:45.881448445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal,Uid:cb1ac25d0c1b1ed395953583f7ac093c,Namespace:kube-system,Attempt:0,} returns sandbox id \"69d1861aaa5d7105116e7a63c399a0bc70857ae492927b5d26345ee5c8e647bd\"" May 15 17:58:45.884433 env[1156]: time="2025-05-15T17:58:45.884398075Z" level=info msg="CreateContainer within sandbox \"69d1861aaa5d7105116e7a63c399a0bc70857ae492927b5d26345ee5c8e647bd\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 17:58:45.935299 kubelet[1699]: W0515 17:58:45.935219 1699 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:45.935299 kubelet[1699]: E0515 17:58:45.935294 1699 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.23:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.23:6443: connect: connection refused May 15 17:58:45.942268 kubelet[1699]: E0515 17:58:45.942173 1699 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.23:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-100-3e5a09d652.novalocal?timeout=10s\": dial tcp 172.24.4.23:6443: connect: connection refused" interval="1.6s" May 15 17:58:46.003874 env[1156]: time="2025-05-15T17:58:46.003715268Z" level=info msg="CreateContainer within sandbox \"5562338c4a2eebe4fc9aa15e6c5a668f4d646ea73e14f986c9fe775976a8ef02\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"84dad9db1631b1a5d075b190cad91c97521ae9b7b5e1bf759f8e9b8e285993c5\"" May 15 17:58:46.005608 env[1156]: time="2025-05-15T17:58:46.005539825Z" level=info msg="StartContainer for \"84dad9db1631b1a5d075b190cad91c97521ae9b7b5e1bf759f8e9b8e285993c5\"" May 15 17:58:46.041325 systemd[1]: Started cri-containerd-84dad9db1631b1a5d075b190cad91c97521ae9b7b5e1bf759f8e9b8e285993c5.scope. May 15 17:58:46.067027 kubelet[1699]: I0515 17:58:46.052418 1699 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:46.067027 kubelet[1699]: E0515 17:58:46.053379 1699 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.23:6443/api/v1/nodes\": dial tcp 172.24.4.23:6443: connect: connection refused" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:46.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.073000 audit: BPF prog-id=73 op=LOAD May 15 17:58:46.075000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.075000 audit[1866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1737 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646164396462313633316231613564303735623139306361643931 May 15 17:58:46.075000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.075000 audit[1866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1737 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646164396462313633316231613564303735623139306361643931 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit: BPF prog-id=74 op=LOAD May 15 17:58:46.076000 audit[1866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000187260 items=0 ppid=1737 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646164396462313633316231613564303735623139306361643931 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit: BPF prog-id=75 op=LOAD May 15 17:58:46.076000 audit[1866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001872a8 items=0 ppid=1737 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646164396462313633316231613564303735623139306361643931 May 15 17:58:46.076000 audit: BPF prog-id=75 op=UNLOAD May 15 17:58:46.076000 audit: BPF prog-id=74 op=UNLOAD May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { perfmon } for pid=1866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit[1866]: AVC avc: denied { bpf } for pid=1866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.076000 audit: BPF prog-id=76 op=LOAD May 15 17:58:46.076000 audit[1866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001876b8 items=0 ppid=1737 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646164396462313633316231613564303735623139306361643931 May 15 17:58:46.258314 env[1156]: time="2025-05-15T17:58:46.258228344Z" level=info msg="StartContainer for \"84dad9db1631b1a5d075b190cad91c97521ae9b7b5e1bf759f8e9b8e285993c5\" returns successfully" May 15 17:58:46.260584 env[1156]: time="2025-05-15T17:58:46.260529198Z" level=info msg="CreateContainer within sandbox \"534cca223f258f98f27c32fd70b534852e0af111937feef1dc7d00f9a47b8f6f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"7bd4934e55595f82cc96440ed08ad176ace00483f889113133c9f983013b23c0\"" May 15 17:58:46.261564 env[1156]: time="2025-05-15T17:58:46.261527324Z" level=info msg="StartContainer for \"7bd4934e55595f82cc96440ed08ad176ace00483f889113133c9f983013b23c0\"" May 15 17:58:46.278093 env[1156]: time="2025-05-15T17:58:46.278006774Z" level=info msg="CreateContainer within sandbox \"69d1861aaa5d7105116e7a63c399a0bc70857ae492927b5d26345ee5c8e647bd\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c446ff44b39325f2889c63886b621724305f665ed4334e9faae80014af5b6d45\"" May 15 17:58:46.279362 env[1156]: time="2025-05-15T17:58:46.279321673Z" level=info msg="StartContainer for \"c446ff44b39325f2889c63886b621724305f665ed4334e9faae80014af5b6d45\"" May 15 17:58:46.303687 systemd[1]: Started cri-containerd-7bd4934e55595f82cc96440ed08ad176ace00483f889113133c9f983013b23c0.scope. May 15 17:58:46.318722 systemd[1]: Started cri-containerd-c446ff44b39325f2889c63886b621724305f665ed4334e9faae80014af5b6d45.scope. May 15 17:58:46.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.340000 audit: BPF prog-id=77 op=LOAD May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1788 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643439333465353535393566383263633936343430656430386164 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1788 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643439333465353535393566383263633936343430656430386164 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit: BPF prog-id=78 op=LOAD May 15 17:58:46.341000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025c490 items=0 ppid=1788 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643439333465353535393566383263633936343430656430386164 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit: BPF prog-id=79 op=LOAD May 15 17:58:46.341000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025c4d8 items=0 ppid=1788 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643439333465353535393566383263633936343430656430386164 May 15 17:58:46.341000 audit: BPF prog-id=79 op=UNLOAD May 15 17:58:46.341000 audit: BPF prog-id=78 op=UNLOAD May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.341000 audit: BPF prog-id=80 op=LOAD May 15 17:58:46.341000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00025c8e8 items=0 ppid=1788 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643439333465353535393566383263633936343430656430386164 May 15 17:58:46.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.364000 audit: BPF prog-id=81 op=LOAD May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1774 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334343666663434623339333235663238383963363338383662363231 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1774 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334343666663434623339333235663238383963363338383662363231 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit: BPF prog-id=82 op=LOAD May 15 17:58:46.365000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00034a610 items=0 ppid=1774 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334343666663434623339333235663238383963363338383662363231 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit: BPF prog-id=83 op=LOAD May 15 17:58:46.365000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00034a658 items=0 ppid=1774 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334343666663434623339333235663238383963363338383662363231 May 15 17:58:46.365000 audit: BPF prog-id=83 op=UNLOAD May 15 17:58:46.365000 audit: BPF prog-id=82 op=UNLOAD May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:46.365000 audit: BPF prog-id=84 op=LOAD May 15 17:58:46.365000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034aa68 items=0 ppid=1774 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:46.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334343666663434623339333235663238383963363338383662363231 May 15 17:58:46.404305 env[1156]: time="2025-05-15T17:58:46.404242128Z" level=info msg="StartContainer for \"7bd4934e55595f82cc96440ed08ad176ace00483f889113133c9f983013b23c0\" returns successfully" May 15 17:58:46.439682 env[1156]: time="2025-05-15T17:58:46.439618505Z" level=info msg="StartContainer for \"c446ff44b39325f2889c63886b621724305f665ed4334e9faae80014af5b6d45\" returns successfully" May 15 17:58:46.567992 systemd[1]: run-containerd-runc-k8s.io-5562338c4a2eebe4fc9aa15e6c5a668f4d646ea73e14f986c9fe775976a8ef02-runc.oDNeAf.mount: Deactivated successfully. May 15 17:58:47.658160 kubelet[1699]: I0515 17:58:47.658133 1699 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:48.234000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.236454 kernel: kauditd_printk_skb: 591 callbacks suppressed May 15 17:58:48.236509 kernel: audit: type=1400 audit(1747331928.234:557): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.234000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003dba690 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.251788 kernel: audit: type=1300 audit(1747331928.234:557): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003dba690 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.234000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.261787 kernel: audit: type=1327 audit(1747331928.234:557): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.250000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.268797 kernel: audit: type=1400 audit(1747331928.250:558): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.250000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00337af40 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.285671 kernel: audit: type=1300 audit(1747331928.250:558): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00337af40 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.285822 kernel: audit: type=1327 audit(1747331928.250:558): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.251000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.251000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003dba8a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.306864 kernel: audit: type=1400 audit(1747331928.251:559): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.306932 kernel: audit: type=1300 audit(1747331928.251:559): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003dba8a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.251000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.313482 kernel: audit: type=1327 audit(1747331928.251:559): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.267000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.267000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c00337bde0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.267000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.268000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.268000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0072d61e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.273000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.322802 kernel: audit: type=1400 audit(1747331928.267:560): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.273000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c00377f4d0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:58:48.273000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:58:48.337000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.337000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0009fa000 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:58:48.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:58:48.337000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:58:48.337000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000294a20 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:58:48.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:58:48.413404 kubelet[1699]: E0515 17:58:48.413364 1699 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-100-3e5a09d652.novalocal\" not found" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:48.473563 kubelet[1699]: I0515 17:58:48.473525 1699 apiserver.go:52] "Watching apiserver" May 15 17:58:48.538931 kubelet[1699]: I0515 17:58:48.538899 1699 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 17:58:48.578159 kubelet[1699]: E0515 17:58:48.578046 1699 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-100-3e5a09d652.novalocal.183fc520a7ef268e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-100-3e5a09d652.novalocal,UID:ci-3510-3-100-3e5a09d652.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-100-3e5a09d652.novalocal,},FirstTimestamp:2025-05-15 17:58:44.490135182 +0000 UTC m=+1.104361059,LastTimestamp:2025-05-15 17:58:44.490135182 +0000 UTC m=+1.104361059,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-100-3e5a09d652.novalocal,}" May 15 17:58:48.608941 kubelet[1699]: I0515 17:58:48.608894 1699 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:48.637306 kubelet[1699]: E0515 17:58:48.637190 1699 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-100-3e5a09d652.novalocal.183fc520ab0dbe44 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-100-3e5a09d652.novalocal,UID:ci-3510-3-100-3e5a09d652.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:ci-3510-3-100-3e5a09d652.novalocal,},FirstTimestamp:2025-05-15 17:58:44.542471748 +0000 UTC m=+1.156697644,LastTimestamp:2025-05-15 17:58:44.542471748 +0000 UTC m=+1.156697644,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-100-3e5a09d652.novalocal,}" May 15 17:58:49.883621 kubelet[1699]: W0515 17:58:49.883566 1699 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 17:58:51.184401 systemd[1]: Reloading. May 15 17:58:51.327688 /usr/lib/systemd/system-generators/torcx-generator[1999]: time="2025-05-15T17:58:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 17:58:51.328136 /usr/lib/systemd/system-generators/torcx-generator[1999]: time="2025-05-15T17:58:51Z" level=info msg="torcx already run" May 15 17:58:51.410699 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 17:58:51.410903 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 17:58:51.435624 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 17:58:51.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit: BPF prog-id=85 op=LOAD May 15 17:58:51.531000 audit: BPF prog-id=81 op=UNLOAD May 15 17:58:51.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.531000 audit: BPF prog-id=86 op=LOAD May 15 17:58:51.531000 audit: BPF prog-id=65 op=UNLOAD May 15 17:58:51.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.534000 audit: BPF prog-id=87 op=LOAD May 15 17:58:51.534000 audit: BPF prog-id=46 op=UNLOAD May 15 17:58:51.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.537000 audit: BPF prog-id=88 op=LOAD May 15 17:58:51.537000 audit: BPF prog-id=73 op=UNLOAD May 15 17:58:51.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit: BPF prog-id=89 op=LOAD May 15 17:58:51.539000 audit: BPF prog-id=61 op=UNLOAD May 15 17:58:51.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit: BPF prog-id=90 op=LOAD May 15 17:58:51.540000 audit: BPF prog-id=77 op=UNLOAD May 15 17:58:51.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.541000 audit: BPF prog-id=91 op=LOAD May 15 17:58:51.541000 audit: BPF prog-id=47 op=UNLOAD May 15 17:58:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.542000 audit: BPF prog-id=92 op=LOAD May 15 17:58:51.542000 audit: BPF prog-id=48 op=UNLOAD May 15 17:58:51.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit: BPF prog-id=93 op=LOAD May 15 17:58:51.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.543000 audit: BPF prog-id=94 op=LOAD May 15 17:58:51.544000 audit: BPF prog-id=49 op=UNLOAD May 15 17:58:51.544000 audit: BPF prog-id=50 op=UNLOAD May 15 17:58:51.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.544000 audit: BPF prog-id=95 op=LOAD May 15 17:58:51.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit: BPF prog-id=96 op=LOAD May 15 17:58:51.545000 audit: BPF prog-id=51 op=UNLOAD May 15 17:58:51.545000 audit: BPF prog-id=52 op=UNLOAD May 15 17:58:51.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.546000 audit: BPF prog-id=97 op=LOAD May 15 17:58:51.546000 audit: BPF prog-id=69 op=UNLOAD May 15 17:58:51.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit: BPF prog-id=98 op=LOAD May 15 17:58:51.548000 audit: BPF prog-id=53 op=UNLOAD May 15 17:58:51.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.548000 audit: BPF prog-id=99 op=LOAD May 15 17:58:51.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit: BPF prog-id=100 op=LOAD May 15 17:58:51.549000 audit: BPF prog-id=54 op=UNLOAD May 15 17:58:51.549000 audit: BPF prog-id=55 op=UNLOAD May 15 17:58:51.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit: BPF prog-id=101 op=LOAD May 15 17:58:51.550000 audit: BPF prog-id=56 op=UNLOAD May 15 17:58:51.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit: BPF prog-id=102 op=LOAD May 15 17:58:51.551000 audit: BPF prog-id=57 op=UNLOAD May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit: BPF prog-id=103 op=LOAD May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.551000 audit: BPF prog-id=104 op=LOAD May 15 17:58:51.552000 audit: BPF prog-id=58 op=UNLOAD May 15 17:58:51.552000 audit: BPF prog-id=59 op=UNLOAD May 15 17:58:51.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.555000 audit: BPF prog-id=105 op=LOAD May 15 17:58:51.555000 audit: BPF prog-id=60 op=UNLOAD May 15 17:58:51.583395 systemd[1]: Stopping kubelet.service... May 15 17:58:51.604126 systemd[1]: kubelet.service: Deactivated successfully. May 15 17:58:51.604844 systemd[1]: Stopped kubelet.service. May 15 17:58:51.605008 systemd[1]: kubelet.service: Consumed 1.381s CPU time. May 15 17:58:51.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:51.607604 systemd[1]: Starting kubelet.service... May 15 17:58:51.780689 systemd[1]: Started kubelet.service. May 15 17:58:51.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:51.860356 kubelet[2041]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 17:58:51.861106 kubelet[2041]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 17:58:51.861236 kubelet[2041]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 17:58:51.861697 kubelet[2041]: I0515 17:58:51.861616 2041 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 17:58:51.871579 kubelet[2041]: I0515 17:58:51.871525 2041 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 17:58:51.873553 kubelet[2041]: I0515 17:58:51.873482 2041 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 17:58:51.880341 kubelet[2041]: I0515 17:58:51.877005 2041 server.go:927] "Client rotation is on, will bootstrap in background" May 15 17:58:51.880341 kubelet[2041]: I0515 17:58:51.878675 2041 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 17:58:51.880341 kubelet[2041]: I0515 17:58:51.880071 2041 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 17:58:51.891072 kubelet[2041]: I0515 17:58:51.891033 2041 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 17:58:51.891287 kubelet[2041]: I0515 17:58:51.891233 2041 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 17:58:51.891481 kubelet[2041]: I0515 17:58:51.891262 2041 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-100-3e5a09d652.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 17:58:51.891715 kubelet[2041]: I0515 17:58:51.891489 2041 topology_manager.go:138] "Creating topology manager with none policy" May 15 17:58:51.891715 kubelet[2041]: I0515 17:58:51.891502 2041 container_manager_linux.go:301] "Creating device plugin manager" May 15 17:58:51.891715 kubelet[2041]: I0515 17:58:51.891538 2041 state_mem.go:36] "Initialized new in-memory state store" May 15 17:58:51.891715 kubelet[2041]: I0515 17:58:51.891661 2041 kubelet.go:400] "Attempting to sync node with API server" May 15 17:58:51.891715 kubelet[2041]: I0515 17:58:51.891675 2041 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 17:58:51.891715 kubelet[2041]: I0515 17:58:51.891696 2041 kubelet.go:312] "Adding apiserver pod source" May 15 17:58:51.891715 kubelet[2041]: I0515 17:58:51.891710 2041 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 17:58:51.894000 audit[2041]: AVC avc: denied { mac_admin } for pid=2041 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.894000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:58:51.894000 audit[2041]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bbc270 a1=c000ac29c0 a2=c000bbc240 a3=25 items=0 ppid=1 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:51.894000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:58:51.894000 audit[2041]: AVC avc: denied { mac_admin } for pid=2041 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:51.894000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:58:51.894000 audit[2041]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a4af40 a1=c000ac29d8 a2=c000bbc300 a3=25 items=0 ppid=1 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:51.894000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:58:51.899655 kubelet[2041]: I0515 17:58:51.892960 2041 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 17:58:51.899655 kubelet[2041]: I0515 17:58:51.893178 2041 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 17:58:51.899655 kubelet[2041]: I0515 17:58:51.893669 2041 server.go:1264] "Started kubelet" May 15 17:58:51.899655 kubelet[2041]: I0515 17:58:51.896322 2041 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 17:58:51.899655 kubelet[2041]: I0515 17:58:51.896377 2041 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 17:58:51.899655 kubelet[2041]: I0515 17:58:51.896406 2041 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 17:58:51.901300 kubelet[2041]: I0515 17:58:51.901216 2041 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 17:58:51.902413 kubelet[2041]: I0515 17:58:51.902372 2041 server.go:455] "Adding debug handlers to kubelet server" May 15 17:58:51.903385 kubelet[2041]: I0515 17:58:51.903320 2041 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 17:58:51.903518 kubelet[2041]: I0515 17:58:51.903506 2041 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 17:58:51.906626 kubelet[2041]: I0515 17:58:51.906581 2041 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 17:58:51.920295 kubelet[2041]: I0515 17:58:51.920271 2041 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 17:58:51.920623 kubelet[2041]: I0515 17:58:51.920611 2041 reconciler.go:26] "Reconciler: start to sync state" May 15 17:58:51.922455 kubelet[2041]: I0515 17:58:51.922441 2041 factory.go:221] Registration of the systemd container factory successfully May 15 17:58:51.922647 kubelet[2041]: I0515 17:58:51.922623 2041 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 17:58:51.935528 kubelet[2041]: I0515 17:58:51.935498 2041 factory.go:221] Registration of the containerd container factory successfully May 15 17:58:51.937649 kubelet[2041]: I0515 17:58:51.937616 2041 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 17:58:51.939268 kubelet[2041]: I0515 17:58:51.939251 2041 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 17:58:51.939383 kubelet[2041]: I0515 17:58:51.939373 2041 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 17:58:51.939510 kubelet[2041]: I0515 17:58:51.939482 2041 kubelet.go:2337] "Starting kubelet main sync loop" May 15 17:58:51.939639 kubelet[2041]: E0515 17:58:51.939621 2041 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 17:58:51.999573 kubelet[2041]: I0515 17:58:51.999551 2041 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 17:58:51.999728 kubelet[2041]: I0515 17:58:51.999717 2041 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 17:58:51.999828 kubelet[2041]: I0515 17:58:51.999819 2041 state_mem.go:36] "Initialized new in-memory state store" May 15 17:58:52.000032 kubelet[2041]: I0515 17:58:52.000018 2041 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 17:58:52.000113 kubelet[2041]: I0515 17:58:52.000089 2041 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 17:58:52.000167 kubelet[2041]: I0515 17:58:52.000159 2041 policy_none.go:49] "None policy: Start" May 15 17:58:52.005546 kubelet[2041]: I0515 17:58:52.005517 2041 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 17:58:52.005645 kubelet[2041]: I0515 17:58:52.005582 2041 state_mem.go:35] "Initializing new in-memory state store" May 15 17:58:52.005881 kubelet[2041]: I0515 17:58:52.005864 2041 state_mem.go:75] "Updated machine memory state" May 15 17:58:52.011704 kubelet[2041]: I0515 17:58:52.011678 2041 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 17:58:52.009000 audit[2041]: AVC avc: denied { mac_admin } for pid=2041 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:58:52.009000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:58:52.009000 audit[2041]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f97da0 a1=c000fe6ca8 a2=c000f97d70 a3=25 items=0 ppid=1 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:58:52.009000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:58:52.012049 kubelet[2041]: I0515 17:58:52.011802 2041 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 17:58:52.012049 kubelet[2041]: I0515 17:58:52.011999 2041 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 17:58:52.012142 kubelet[2041]: I0515 17:58:52.012124 2041 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 17:58:52.012252 kubelet[2041]: I0515 17:58:52.012235 2041 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.029666 kubelet[2041]: I0515 17:58:52.029636 2041 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.029967 kubelet[2041]: I0515 17:58:52.029935 2041 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.043069 kubelet[2041]: I0515 17:58:52.042957 2041 topology_manager.go:215] "Topology Admit Handler" podUID="1eb00da8aee05ced7cb5f755c2097893" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.045134 kubelet[2041]: I0515 17:58:52.045107 2041 topology_manager.go:215] "Topology Admit Handler" podUID="1bb9d88c081f8e650c7afd9cbada7dfd" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.045215 kubelet[2041]: I0515 17:58:52.045187 2041 topology_manager.go:215] "Topology Admit Handler" podUID="cb1ac25d0c1b1ed395953583f7ac093c" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.059187 kubelet[2041]: W0515 17:58:52.059162 2041 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 17:58:52.059602 kubelet[2041]: W0515 17:58:52.059587 2041 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 17:58:52.060042 kubelet[2041]: W0515 17:58:52.059990 2041 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 17:58:52.060095 kubelet[2041]: E0515 17:58:52.060067 2041 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.122407 kubelet[2041]: I0515 17:58:52.122333 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1eb00da8aee05ced7cb5f755c2097893-ca-certs\") pod \"kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1eb00da8aee05ced7cb5f755c2097893\") " pod="kube-system/kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.122724 kubelet[2041]: I0515 17:58:52.122684 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1eb00da8aee05ced7cb5f755c2097893-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1eb00da8aee05ced7cb5f755c2097893\") " pod="kube-system/kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.123052 kubelet[2041]: I0515 17:58:52.123015 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-ca-certs\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.123350 kubelet[2041]: I0515 17:58:52.123316 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.123647 kubelet[2041]: I0515 17:58:52.123566 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/cb1ac25d0c1b1ed395953583f7ac093c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"cb1ac25d0c1b1ed395953583f7ac093c\") " pod="kube-system/kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.124001 kubelet[2041]: I0515 17:58:52.123967 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1eb00da8aee05ced7cb5f755c2097893-k8s-certs\") pod \"kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1eb00da8aee05ced7cb5f755c2097893\") " pod="kube-system/kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.124286 kubelet[2041]: I0515 17:58:52.124253 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.124574 kubelet[2041]: I0515 17:58:52.124504 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.124899 kubelet[2041]: I0515 17:58:52.124822 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1bb9d88c081f8e650c7afd9cbada7dfd-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal\" (UID: \"1bb9d88c081f8e650c7afd9cbada7dfd\") " pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.906926 kubelet[2041]: I0515 17:58:52.906856 2041 apiserver.go:52] "Watching apiserver" May 15 17:58:52.920724 kubelet[2041]: I0515 17:58:52.920641 2041 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 17:58:52.987155 kubelet[2041]: W0515 17:58:52.987130 2041 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 17:58:52.987409 kubelet[2041]: E0515 17:58:52.987381 2041 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" May 15 17:58:52.994947 kubelet[2041]: I0515 17:58:52.994871 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-100-3e5a09d652.novalocal" podStartSLOduration=3.994812975 podStartE2EDuration="3.994812975s" podCreationTimestamp="2025-05-15 17:58:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 17:58:52.983303684 +0000 UTC m=+1.197842146" watchObservedRunningTime="2025-05-15 17:58:52.994812975 +0000 UTC m=+1.209351407" May 15 17:58:53.013063 kubelet[2041]: I0515 17:58:53.013007 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-100-3e5a09d652.novalocal" podStartSLOduration=1.012986177 podStartE2EDuration="1.012986177s" podCreationTimestamp="2025-05-15 17:58:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 17:58:52.996127047 +0000 UTC m=+1.210665469" watchObservedRunningTime="2025-05-15 17:58:53.012986177 +0000 UTC m=+1.227524599" May 15 17:58:53.032358 kubelet[2041]: I0515 17:58:53.032232 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-100-3e5a09d652.novalocal" podStartSLOduration=1.032214682 podStartE2EDuration="1.032214682s" podCreationTimestamp="2025-05-15 17:58:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 17:58:53.01335562 +0000 UTC m=+1.227894042" watchObservedRunningTime="2025-05-15 17:58:53.032214682 +0000 UTC m=+1.246753114" May 15 17:58:58.227540 sudo[1335]: pam_unix(sudo:session): session closed for user root May 15 17:58:58.227000 audit[1335]: USER_END pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:58.230072 kernel: kauditd_printk_skb: 272 callbacks suppressed May 15 17:58:58.230202 kernel: audit: type=1106 audit(1747331938.227:814): pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:58.249090 kernel: audit: type=1104 audit(1747331938.228:815): pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:58.228000 audit[1335]: CRED_DISP pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:58:58.402324 sshd[1332]: pam_unix(sshd:session): session closed for user core May 15 17:58:58.404000 audit[1332]: USER_END pid=1332 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:58.408779 systemd[1]: sshd@8-172.24.4.23:22-172.24.4.1:44028.service: Deactivated successfully. May 15 17:58:58.410493 systemd[1]: session-9.scope: Deactivated successfully. May 15 17:58:58.410884 systemd[1]: session-9.scope: Consumed 6.578s CPU time. May 15 17:58:58.422829 kernel: audit: type=1106 audit(1747331938.404:816): pid=1332 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:58.404000 audit[1332]: CRED_DISP pid=1332 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:58.424984 systemd-logind[1148]: Session 9 logged out. Waiting for processes to exit. May 15 17:58:58.427050 systemd-logind[1148]: Removed session 9. May 15 17:58:58.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.23:22-172.24.4.1:44028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:58:58.450318 kernel: audit: type=1104 audit(1747331938.404:817): pid=1332 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:58:58.450478 kernel: audit: type=1131 audit(1747331938.405:818): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.23:22-172.24.4.1:44028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:59:01.458000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 17:59:01.458000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010c0740 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:59:01.495908 kernel: audit: type=1400 audit(1747331941.458:819): avc: denied { watch } for pid=1929 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 17:59:01.496070 kernel: audit: type=1300 audit(1747331941.458:819): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010c0740 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:59:01.496946 kernel: audit: type=1327 audit(1747331941.458:819): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:59:01.458000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:59:02.559000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:02.575818 kernel: audit: type=1400 audit(1747331942.559:820): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:02.561000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:02.590873 kernel: audit: type=1400 audit(1747331942.561:821): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:02.561000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c3fa40 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:59:02.561000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:59:02.561000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:02.561000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c3fa80 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:59:02.561000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:59:02.561000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:02.561000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c3fac0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:59:02.561000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:59:02.559000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f79540 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:59:02.559000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:59:04.370418 kubelet[2041]: I0515 17:59:04.370380 2041 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 17:59:04.371360 env[1156]: time="2025-05-15T17:59:04.371290474Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 17:59:04.371760 kubelet[2041]: I0515 17:59:04.371743 2041 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 17:59:05.206217 kubelet[2041]: I0515 17:59:05.206176 2041 topology_manager.go:215] "Topology Admit Handler" podUID="43ee2d9b-202b-4b26-998e-0efddfd3b4cf" podNamespace="kube-system" podName="kube-proxy-sfwm2" May 15 17:59:05.211442 systemd[1]: Created slice kubepods-besteffort-pod43ee2d9b_202b_4b26_998e_0efddfd3b4cf.slice. May 15 17:59:05.213417 kubelet[2041]: W0515 17:59:05.213386 2041 reflector.go:547] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-100-3e5a09d652.novalocal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-100-3e5a09d652.novalocal' and this object May 15 17:59:05.213510 kubelet[2041]: E0515 17:59:05.213425 2041 reflector.go:150] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-100-3e5a09d652.novalocal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-100-3e5a09d652.novalocal' and this object May 15 17:59:05.213510 kubelet[2041]: W0515 17:59:05.213493 2041 reflector.go:547] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510-3-100-3e5a09d652.novalocal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-100-3e5a09d652.novalocal' and this object May 15 17:59:05.213510 kubelet[2041]: E0515 17:59:05.213507 2041 reflector.go:150] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510-3-100-3e5a09d652.novalocal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-100-3e5a09d652.novalocal' and this object May 15 17:59:05.215442 kubelet[2041]: I0515 17:59:05.215411 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wb975\" (UniqueName: \"kubernetes.io/projected/43ee2d9b-202b-4b26-998e-0efddfd3b4cf-kube-api-access-wb975\") pod \"kube-proxy-sfwm2\" (UID: \"43ee2d9b-202b-4b26-998e-0efddfd3b4cf\") " pod="kube-system/kube-proxy-sfwm2" May 15 17:59:05.215506 kubelet[2041]: I0515 17:59:05.215449 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/43ee2d9b-202b-4b26-998e-0efddfd3b4cf-kube-proxy\") pod \"kube-proxy-sfwm2\" (UID: \"43ee2d9b-202b-4b26-998e-0efddfd3b4cf\") " pod="kube-system/kube-proxy-sfwm2" May 15 17:59:05.215506 kubelet[2041]: I0515 17:59:05.215469 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/43ee2d9b-202b-4b26-998e-0efddfd3b4cf-xtables-lock\") pod \"kube-proxy-sfwm2\" (UID: \"43ee2d9b-202b-4b26-998e-0efddfd3b4cf\") " pod="kube-system/kube-proxy-sfwm2" May 15 17:59:05.215506 kubelet[2041]: I0515 17:59:05.215487 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/43ee2d9b-202b-4b26-998e-0efddfd3b4cf-lib-modules\") pod \"kube-proxy-sfwm2\" (UID: \"43ee2d9b-202b-4b26-998e-0efddfd3b4cf\") " pod="kube-system/kube-proxy-sfwm2" May 15 17:59:05.402628 kubelet[2041]: I0515 17:59:05.402586 2041 topology_manager.go:215] "Topology Admit Handler" podUID="b92510e9-25eb-4e9f-884b-96969aa56463" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-rfx8g" May 15 17:59:05.408520 systemd[1]: Created slice kubepods-besteffort-podb92510e9_25eb_4e9f_884b_96969aa56463.slice. May 15 17:59:05.417438 kubelet[2041]: I0515 17:59:05.417377 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b92510e9-25eb-4e9f-884b-96969aa56463-var-lib-calico\") pod \"tigera-operator-797db67f8-rfx8g\" (UID: \"b92510e9-25eb-4e9f-884b-96969aa56463\") " pod="tigera-operator/tigera-operator-797db67f8-rfx8g" May 15 17:59:05.417438 kubelet[2041]: I0515 17:59:05.417436 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pzv4d\" (UniqueName: \"kubernetes.io/projected/b92510e9-25eb-4e9f-884b-96969aa56463-kube-api-access-pzv4d\") pod \"tigera-operator-797db67f8-rfx8g\" (UID: \"b92510e9-25eb-4e9f-884b-96969aa56463\") " pod="tigera-operator/tigera-operator-797db67f8-rfx8g" May 15 17:59:05.717644 env[1156]: time="2025-05-15T17:59:05.717553359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-rfx8g,Uid:b92510e9-25eb-4e9f-884b-96969aa56463,Namespace:tigera-operator,Attempt:0,}" May 15 17:59:05.763805 env[1156]: time="2025-05-15T17:59:05.763584530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:05.764286 env[1156]: time="2025-05-15T17:59:05.763672279Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:05.764541 env[1156]: time="2025-05-15T17:59:05.764241618Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:05.765405 env[1156]: time="2025-05-15T17:59:05.765270991Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0fb87e357217b00b5c247cd0c7bce1806d47306eefa52fda238c45969b647b67 pid=2126 runtime=io.containerd.runc.v2 May 15 17:59:05.809963 systemd[1]: Started cri-containerd-0fb87e357217b00b5c247cd0c7bce1806d47306eefa52fda238c45969b647b67.scope. May 15 17:59:05.828639 kernel: kauditd_printk_skb: 10 callbacks suppressed May 15 17:59:05.828989 kernel: audit: type=1400 audit(1747331945.820:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.838769 kernel: audit: type=1400 audit(1747331945.820:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.844797 kernel: audit: type=1400 audit(1747331945.820:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.856221 kernel: audit: type=1400 audit(1747331945.820:827): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.856274 kernel: audit: type=1400 audit(1747331945.820:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.861014 kernel: audit: type=1400 audit(1747331945.820:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.865762 kernel: audit: type=1400 audit(1747331945.820:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.870475 kernel: audit: type=1400 audit(1747331945.820:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.875090 kernel: audit: type=1400 audit(1747331945.820:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.875126 kernel: audit: type=1400 audit(1747331945.827:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.827000 audit: BPF prog-id=106 op=LOAD May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2126 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:05.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623837653335373231376230306235633234376364306337626365 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2126 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:05.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623837653335373231376230306235633234376364306337626365 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit: BPF prog-id=107 op=LOAD May 15 17:59:05.828000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8f80 items=0 ppid=2126 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:05.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623837653335373231376230306235633234376364306337626365 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit: BPF prog-id=108 op=LOAD May 15 17:59:05.828000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8fc8 items=0 ppid=2126 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:05.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623837653335373231376230306235633234376364306337626365 May 15 17:59:05.828000 audit: BPF prog-id=108 op=UNLOAD May 15 17:59:05.828000 audit: BPF prog-id=107 op=UNLOAD May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { perfmon } for pid=2138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit[2138]: AVC avc: denied { bpf } for pid=2138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:05.828000 audit: BPF prog-id=109 op=LOAD May 15 17:59:05.828000 audit[2138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c93d8 items=0 ppid=2126 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:05.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623837653335373231376230306235633234376364306337626365 May 15 17:59:05.898717 env[1156]: time="2025-05-15T17:59:05.898671480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-rfx8g,Uid:b92510e9-25eb-4e9f-884b-96969aa56463,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0fb87e357217b00b5c247cd0c7bce1806d47306eefa52fda238c45969b647b67\"" May 15 17:59:05.902411 env[1156]: time="2025-05-15T17:59:05.901031430Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 17:59:06.324676 kubelet[2041]: E0515 17:59:06.324605 2041 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 15 17:59:06.324676 kubelet[2041]: E0515 17:59:06.324677 2041 projected.go:200] Error preparing data for projected volume kube-api-access-wb975 for pod kube-system/kube-proxy-sfwm2: failed to sync configmap cache: timed out waiting for the condition May 15 17:59:06.325819 kubelet[2041]: E0515 17:59:06.325262 2041 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/43ee2d9b-202b-4b26-998e-0efddfd3b4cf-kube-api-access-wb975 podName:43ee2d9b-202b-4b26-998e-0efddfd3b4cf nodeName:}" failed. No retries permitted until 2025-05-15 17:59:06.824809152 +0000 UTC m=+15.039347625 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-wb975" (UniqueName: "kubernetes.io/projected/43ee2d9b-202b-4b26-998e-0efddfd3b4cf-kube-api-access-wb975") pod "kube-proxy-sfwm2" (UID: "43ee2d9b-202b-4b26-998e-0efddfd3b4cf") : failed to sync configmap cache: timed out waiting for the condition May 15 17:59:07.020209 env[1156]: time="2025-05-15T17:59:07.020055795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sfwm2,Uid:43ee2d9b-202b-4b26-998e-0efddfd3b4cf,Namespace:kube-system,Attempt:0,}" May 15 17:59:07.063057 env[1156]: time="2025-05-15T17:59:07.062652302Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:07.063057 env[1156]: time="2025-05-15T17:59:07.062787185Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:07.063057 env[1156]: time="2025-05-15T17:59:07.062825363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:07.063813 env[1156]: time="2025-05-15T17:59:07.063661116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fba5541ce6fde5fb8ee46b5bac0586b811902bb0390cb05020145a69a6c5dbf0 pid=2167 runtime=io.containerd.runc.v2 May 15 17:59:07.113864 systemd[1]: run-containerd-runc-k8s.io-fba5541ce6fde5fb8ee46b5bac0586b811902bb0390cb05020145a69a6c5dbf0-runc.0yLM1D.mount: Deactivated successfully. May 15 17:59:07.117818 systemd[1]: Started cri-containerd-fba5541ce6fde5fb8ee46b5bac0586b811902bb0390cb05020145a69a6c5dbf0.scope. May 15 17:59:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit: BPF prog-id=110 op=LOAD May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2167 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613535343163653666646535666238656534366235626163303538 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2167 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613535343163653666646535666238656534366235626163303538 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit: BPF prog-id=111 op=LOAD May 15 17:59:07.127000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218f30 items=0 ppid=2167 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613535343163653666646535666238656534366235626163303538 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit: BPF prog-id=112 op=LOAD May 15 17:59:07.127000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218f78 items=0 ppid=2167 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613535343163653666646535666238656534366235626163303538 May 15 17:59:07.127000 audit: BPF prog-id=112 op=UNLOAD May 15 17:59:07.127000 audit: BPF prog-id=111 op=UNLOAD May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.127000 audit: BPF prog-id=113 op=LOAD May 15 17:59:07.127000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219388 items=0 ppid=2167 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613535343163653666646535666238656534366235626163303538 May 15 17:59:07.139970 env[1156]: time="2025-05-15T17:59:07.139926334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sfwm2,Uid:43ee2d9b-202b-4b26-998e-0efddfd3b4cf,Namespace:kube-system,Attempt:0,} returns sandbox id \"fba5541ce6fde5fb8ee46b5bac0586b811902bb0390cb05020145a69a6c5dbf0\"" May 15 17:59:07.142824 env[1156]: time="2025-05-15T17:59:07.142786779Z" level=info msg="CreateContainer within sandbox \"fba5541ce6fde5fb8ee46b5bac0586b811902bb0390cb05020145a69a6c5dbf0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 17:59:07.172595 env[1156]: time="2025-05-15T17:59:07.172512251Z" level=info msg="CreateContainer within sandbox \"fba5541ce6fde5fb8ee46b5bac0586b811902bb0390cb05020145a69a6c5dbf0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fc97a004388653c69bf163215c7842d6761ede5850e0ec177115105527b8257e\"" May 15 17:59:07.173430 env[1156]: time="2025-05-15T17:59:07.173407354Z" level=info msg="StartContainer for \"fc97a004388653c69bf163215c7842d6761ede5850e0ec177115105527b8257e\"" May 15 17:59:07.194604 systemd[1]: Started cri-containerd-fc97a004388653c69bf163215c7842d6761ede5850e0ec177115105527b8257e.scope. May 15 17:59:07.212000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f0338684cb8 items=0 ppid=2167 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393761303034333838363533633639626631363332313563373834 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.212000 audit: BPF prog-id=114 op=LOAD May 15 17:59:07.212000 audit[2209]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b5038 items=0 ppid=2167 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393761303034333838363533633639626631363332313563373834 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit: BPF prog-id=115 op=LOAD May 15 17:59:07.213000 audit[2209]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b5088 items=0 ppid=2167 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393761303034333838363533633639626631363332313563373834 May 15 17:59:07.213000 audit: BPF prog-id=115 op=UNLOAD May 15 17:59:07.213000 audit: BPF prog-id=114 op=UNLOAD May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:07.213000 audit: BPF prog-id=116 op=LOAD May 15 17:59:07.213000 audit[2209]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b5118 items=0 ppid=2167 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393761303034333838363533633639626631363332313563373834 May 15 17:59:07.235281 env[1156]: time="2025-05-15T17:59:07.235226124Z" level=info msg="StartContainer for \"fc97a004388653c69bf163215c7842d6761ede5850e0ec177115105527b8257e\" returns successfully" May 15 17:59:07.288000 audit[2261]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.288000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc68fdeda0 a2=0 a3=7ffc68fded8c items=0 ppid=2219 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 17:59:07.292000 audit[2262]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.292000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc2ae8040 a2=0 a3=7ffcc2ae802c items=0 ppid=2219 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 17:59:07.294000 audit[2264]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.294000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff68954e70 a2=0 a3=7fff68954e5c items=0 ppid=2219 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 17:59:07.296000 audit[2265]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.296000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0195c2e0 a2=0 a3=7ffc0195c2cc items=0 ppid=2219 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 17:59:07.301000 audit[2263]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.301000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc38196000 a2=0 a3=7ffc38195fec items=0 ppid=2219 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 17:59:07.302000 audit[2267]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.302000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcca28e110 a2=0 a3=7ffcca28e0fc items=0 ppid=2219 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 17:59:07.392000 audit[2268]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.392000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffa0ef8460 a2=0 a3=7fffa0ef844c items=0 ppid=2219 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 17:59:07.396000 audit[2270]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.396000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff6a9074a0 a2=0 a3=7fff6a90748c items=0 ppid=2219 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.396000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 17:59:07.399000 audit[2273]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.399000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffedd5afc90 a2=0 a3=7ffedd5afc7c items=0 ppid=2219 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 17:59:07.401000 audit[2274]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.401000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd29d8c1d0 a2=0 a3=7ffd29d8c1bc items=0 ppid=2219 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 17:59:07.407000 audit[2276]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.407000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2c277a50 a2=0 a3=7ffe2c277a3c items=0 ppid=2219 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 17:59:07.409000 audit[2277]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.409000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf47c2cc0 a2=0 a3=7ffcf47c2cac items=0 ppid=2219 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 17:59:07.411000 audit[2279]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.411000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe40929f90 a2=0 a3=7ffe40929f7c items=0 ppid=2219 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 17:59:07.417000 audit[2282]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.417000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff373afe50 a2=0 a3=7fff373afe3c items=0 ppid=2219 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 17:59:07.419000 audit[2283]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.419000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1420c870 a2=0 a3=7ffd1420c85c items=0 ppid=2219 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 17:59:07.422000 audit[2285]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.422000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb48ef0f0 a2=0 a3=7ffdb48ef0dc items=0 ppid=2219 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 17:59:07.423000 audit[2286]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.423000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc3a97550 a2=0 a3=7ffdc3a9753c items=0 ppid=2219 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 17:59:07.427000 audit[2288]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.427000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee9155400 a2=0 a3=7ffee91553ec items=0 ppid=2219 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 17:59:07.431000 audit[2291]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.431000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0e4b08f0 a2=0 a3=7ffc0e4b08dc items=0 ppid=2219 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 17:59:07.436000 audit[2294]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.436000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef3a3c140 a2=0 a3=7ffef3a3c12c items=0 ppid=2219 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 17:59:07.438000 audit[2295]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.438000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffefb6b9000 a2=0 a3=7ffefb6b8fec items=0 ppid=2219 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 17:59:07.443000 audit[2297]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.443000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdbf790bf0 a2=0 a3=7ffdbf790bdc items=0 ppid=2219 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 17:59:07.448000 audit[2300]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.448000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1d92c380 a2=0 a3=7fff1d92c36c items=0 ppid=2219 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 17:59:07.450000 audit[2301]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.450000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddd160ef0 a2=0 a3=7ffddd160edc items=0 ppid=2219 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 17:59:07.454000 audit[2303]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:59:07.454000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe490e1b40 a2=0 a3=7ffe490e1b2c items=0 ppid=2219 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 17:59:07.486000 audit[2309]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:07.486000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff80f59700 a2=0 a3=7fff80f596ec items=0 ppid=2219 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:07.504000 audit[2309]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:07.504000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff80f59700 a2=0 a3=7fff80f596ec items=0 ppid=2219 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:07.507000 audit[2315]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.507000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd085d8510 a2=0 a3=7ffd085d84fc items=0 ppid=2219 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 17:59:07.511000 audit[2317]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.511000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdaea62a00 a2=0 a3=7ffdaea629ec items=0 ppid=2219 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 17:59:07.516000 audit[2320]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.516000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb6f99920 a2=0 a3=7ffeb6f9990c items=0 ppid=2219 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 17:59:07.519000 audit[2321]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.519000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb2194f90 a2=0 a3=7ffdb2194f7c items=0 ppid=2219 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 17:59:07.521000 audit[2323]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.521000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdcdd70bd0 a2=0 a3=7ffdcdd70bbc items=0 ppid=2219 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 17:59:07.522000 audit[2324]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.522000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4a86a560 a2=0 a3=7ffd4a86a54c items=0 ppid=2219 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 17:59:07.525000 audit[2326]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.525000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefa1f0740 a2=0 a3=7ffefa1f072c items=0 ppid=2219 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 17:59:07.530000 audit[2329]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.530000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe8b3fff80 a2=0 a3=7ffe8b3fff6c items=0 ppid=2219 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 17:59:07.531000 audit[2330]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.531000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6b47f680 a2=0 a3=7fff6b47f66c items=0 ppid=2219 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 17:59:07.536000 audit[2332]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.536000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdefb8660 a2=0 a3=7fffdefb864c items=0 ppid=2219 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 17:59:07.538000 audit[2333]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.538000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5c79c240 a2=0 a3=7ffe5c79c22c items=0 ppid=2219 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 17:59:07.548000 audit[2335]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.548000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccb716f90 a2=0 a3=7ffccb716f7c items=0 ppid=2219 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 17:59:07.552000 audit[2338]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.552000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb86e9920 a2=0 a3=7fffb86e990c items=0 ppid=2219 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 17:59:07.555000 audit[2341]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.555000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3a3f2c80 a2=0 a3=7ffe3a3f2c6c items=0 ppid=2219 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 17:59:07.557000 audit[2342]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.557000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffebf01a5b0 a2=0 a3=7ffebf01a59c items=0 ppid=2219 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 17:59:07.559000 audit[2344]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.559000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffecf146c0 a2=0 a3=7fffecf146ac items=0 ppid=2219 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 17:59:07.563000 audit[2347]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.563000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcdd7aa160 a2=0 a3=7ffcdd7aa14c items=0 ppid=2219 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 17:59:07.565000 audit[2348]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.565000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca4fa7420 a2=0 a3=7ffca4fa740c items=0 ppid=2219 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 17:59:07.569000 audit[2350]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.569000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffee2e21b30 a2=0 a3=7ffee2e21b1c items=0 ppid=2219 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 17:59:07.571000 audit[2351]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.571000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1790bb60 a2=0 a3=7ffc1790bb4c items=0 ppid=2219 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 17:59:07.574000 audit[2353]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.574000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe514391a0 a2=0 a3=7ffe5143918c items=0 ppid=2219 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 17:59:07.578000 audit[2356]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:59:07.578000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce1d2d790 a2=0 a3=7ffce1d2d77c items=0 ppid=2219 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 17:59:07.581000 audit[2358]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 17:59:07.581000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc1e64c620 a2=0 a3=7ffc1e64c60c items=0 ppid=2219 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.581000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:07.581000 audit[2358]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 17:59:07.581000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc1e64c620 a2=0 a3=7ffc1e64c60c items=0 ppid=2219 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:07.581000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:08.406429 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount832995489.mount: Deactivated successfully. May 15 17:59:09.604266 env[1156]: time="2025-05-15T17:59:09.604194211Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:09.607304 env[1156]: time="2025-05-15T17:59:09.607239387Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:09.609416 env[1156]: time="2025-05-15T17:59:09.609374587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:09.611948 env[1156]: time="2025-05-15T17:59:09.611901526Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:09.612892 env[1156]: time="2025-05-15T17:59:09.612864169Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 17:59:09.619550 env[1156]: time="2025-05-15T17:59:09.619489350Z" level=info msg="CreateContainer within sandbox \"0fb87e357217b00b5c247cd0c7bce1806d47306eefa52fda238c45969b647b67\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 17:59:09.641123 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount453367466.mount: Deactivated successfully. May 15 17:59:09.644238 env[1156]: time="2025-05-15T17:59:09.644168479Z" level=info msg="CreateContainer within sandbox \"0fb87e357217b00b5c247cd0c7bce1806d47306eefa52fda238c45969b647b67\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a6cc91e7759ae37f6b88acfb91169245c484c75cc66e80df129367790d8b0785\"" May 15 17:59:09.645166 env[1156]: time="2025-05-15T17:59:09.645143888Z" level=info msg="StartContainer for \"a6cc91e7759ae37f6b88acfb91169245c484c75cc66e80df129367790d8b0785\"" May 15 17:59:09.691800 systemd[1]: Started cri-containerd-a6cc91e7759ae37f6b88acfb91169245c484c75cc66e80df129367790d8b0785.scope. May 15 17:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.705000 audit: BPF prog-id=117 op=LOAD May 15 17:59:09.706000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.706000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2126 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:09.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136636339316537373539616533376636623838616366623931313639 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2126 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:09.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136636339316537373539616533376636623838616366623931313639 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.707000 audit: BPF prog-id=118 op=LOAD May 15 17:59:09.707000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000246c0 items=0 ppid=2126 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:09.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136636339316537373539616533376636623838616366623931313639 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.708000 audit: BPF prog-id=119 op=LOAD May 15 17:59:09.708000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024708 items=0 ppid=2126 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:09.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136636339316537373539616533376636623838616366623931313639 May 15 17:59:09.708000 audit: BPF prog-id=119 op=UNLOAD May 15 17:59:09.708000 audit: BPF prog-id=118 op=UNLOAD May 15 17:59:09.709000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:09.709000 audit: BPF prog-id=120 op=LOAD May 15 17:59:09.709000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024b18 items=0 ppid=2126 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:09.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136636339316537373539616533376636623838616366623931313639 May 15 17:59:09.728071 env[1156]: time="2025-05-15T17:59:09.728016717Z" level=info msg="StartContainer for \"a6cc91e7759ae37f6b88acfb91169245c484c75cc66e80df129367790d8b0785\" returns successfully" May 15 17:59:10.063509 kubelet[2041]: I0515 17:59:10.063300 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-sfwm2" podStartSLOduration=5.063108324 podStartE2EDuration="5.063108324s" podCreationTimestamp="2025-05-15 17:59:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 17:59:08.054888192 +0000 UTC m=+16.269426615" watchObservedRunningTime="2025-05-15 17:59:10.063108324 +0000 UTC m=+18.277646796" May 15 17:59:10.064421 kubelet[2041]: I0515 17:59:10.063642 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-rfx8g" podStartSLOduration=1.349041525 podStartE2EDuration="5.063625135s" podCreationTimestamp="2025-05-15 17:59:05 +0000 UTC" firstStartedPulling="2025-05-15 17:59:05.900503857 +0000 UTC m=+14.115042279" lastFinishedPulling="2025-05-15 17:59:09.615087426 +0000 UTC m=+17.829625889" observedRunningTime="2025-05-15 17:59:10.062678087 +0000 UTC m=+18.277216559" watchObservedRunningTime="2025-05-15 17:59:10.063625135 +0000 UTC m=+18.278163607" May 15 17:59:12.962000 audit[2398]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:12.964464 kernel: kauditd_printk_skb: 357 callbacks suppressed May 15 17:59:12.964521 kernel: audit: type=1325 audit(1747331952.962:935): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:12.962000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff1fe774e0 a2=0 a3=7fff1fe774cc items=0 ppid=2219 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:12.976105 kernel: audit: type=1300 audit(1747331952.962:935): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff1fe774e0 a2=0 a3=7fff1fe774cc items=0 ppid=2219 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:12.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:12.983757 kernel: audit: type=1327 audit(1747331952.962:935): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:12.983000 audit[2398]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:12.983000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff1fe774e0 a2=0 a3=0 items=0 ppid=2219 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:12.995838 kernel: audit: type=1325 audit(1747331952.983:936): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:12.996016 kernel: audit: type=1300 audit(1747331952.983:936): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff1fe774e0 a2=0 a3=0 items=0 ppid=2219 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:12.996046 kernel: audit: type=1327 audit(1747331952.983:936): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:12.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:13.004000 audit[2400]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:13.004000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd3bcec460 a2=0 a3=7ffd3bcec44c items=0 ppid=2219 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.016128 kernel: audit: type=1325 audit(1747331953.004:937): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:13.016266 kernel: audit: type=1300 audit(1747331953.004:937): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd3bcec460 a2=0 a3=7ffd3bcec44c items=0 ppid=2219 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.016298 kernel: audit: type=1327 audit(1747331953.004:937): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:13.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:13.025000 audit[2400]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:13.025000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd3bcec460 a2=0 a3=0 items=0 ppid=2219 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:13.030767 kernel: audit: type=1325 audit(1747331953.025:938): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:13.135143 kubelet[2041]: I0515 17:59:13.135096 2041 topology_manager.go:215] "Topology Admit Handler" podUID="7a614419-5238-4114-803d-86c5d35422eb" podNamespace="calico-system" podName="calico-typha-c4b668bf4-kp2h4" May 15 17:59:13.140841 systemd[1]: Created slice kubepods-besteffort-pod7a614419_5238_4114_803d_86c5d35422eb.slice. May 15 17:59:13.180411 kubelet[2041]: I0515 17:59:13.180364 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wtzsl\" (UniqueName: \"kubernetes.io/projected/7a614419-5238-4114-803d-86c5d35422eb-kube-api-access-wtzsl\") pod \"calico-typha-c4b668bf4-kp2h4\" (UID: \"7a614419-5238-4114-803d-86c5d35422eb\") " pod="calico-system/calico-typha-c4b668bf4-kp2h4" May 15 17:59:13.180561 kubelet[2041]: I0515 17:59:13.180452 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7a614419-5238-4114-803d-86c5d35422eb-tigera-ca-bundle\") pod \"calico-typha-c4b668bf4-kp2h4\" (UID: \"7a614419-5238-4114-803d-86c5d35422eb\") " pod="calico-system/calico-typha-c4b668bf4-kp2h4" May 15 17:59:13.180561 kubelet[2041]: I0515 17:59:13.180483 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7a614419-5238-4114-803d-86c5d35422eb-typha-certs\") pod \"calico-typha-c4b668bf4-kp2h4\" (UID: \"7a614419-5238-4114-803d-86c5d35422eb\") " pod="calico-system/calico-typha-c4b668bf4-kp2h4" May 15 17:59:13.239551 kubelet[2041]: I0515 17:59:13.239508 2041 topology_manager.go:215] "Topology Admit Handler" podUID="25af9776-fc6f-465a-8bf9-72831ee284f1" podNamespace="calico-system" podName="calico-node-cqzdd" May 15 17:59:13.249068 systemd[1]: Created slice kubepods-besteffort-pod25af9776_fc6f_465a_8bf9_72831ee284f1.slice. May 15 17:59:13.281618 kubelet[2041]: I0515 17:59:13.281568 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-lib-modules\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.281818 kubelet[2041]: I0515 17:59:13.281627 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-cni-log-dir\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.281818 kubelet[2041]: I0515 17:59:13.281661 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-xtables-lock\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.281818 kubelet[2041]: I0515 17:59:13.281679 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-var-run-calico\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.281818 kubelet[2041]: I0515 17:59:13.281708 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-var-lib-calico\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.281818 kubelet[2041]: I0515 17:59:13.281727 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-cni-net-dir\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.282464 kubelet[2041]: I0515 17:59:13.281764 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/25af9776-fc6f-465a-8bf9-72831ee284f1-tigera-ca-bundle\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.282464 kubelet[2041]: I0515 17:59:13.281783 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m4z9j\" (UniqueName: \"kubernetes.io/projected/25af9776-fc6f-465a-8bf9-72831ee284f1-kube-api-access-m4z9j\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.282464 kubelet[2041]: I0515 17:59:13.281801 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-policysync\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.282464 kubelet[2041]: I0515 17:59:13.281829 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-cni-bin-dir\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.282464 kubelet[2041]: I0515 17:59:13.281847 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/25af9776-fc6f-465a-8bf9-72831ee284f1-flexvol-driver-host\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.282602 kubelet[2041]: I0515 17:59:13.281865 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/25af9776-fc6f-465a-8bf9-72831ee284f1-node-certs\") pod \"calico-node-cqzdd\" (UID: \"25af9776-fc6f-465a-8bf9-72831ee284f1\") " pod="calico-system/calico-node-cqzdd" May 15 17:59:13.364441 kubelet[2041]: I0515 17:59:13.364391 2041 topology_manager.go:215] "Topology Admit Handler" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" podNamespace="calico-system" podName="csi-node-driver-2cnjs" May 15 17:59:13.364836 kubelet[2041]: E0515 17:59:13.364801 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:13.382713 kubelet[2041]: I0515 17:59:13.382665 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f6812bd3-d952-466a-8323-4afab6f4de1a-socket-dir\") pod \"csi-node-driver-2cnjs\" (UID: \"f6812bd3-d952-466a-8323-4afab6f4de1a\") " pod="calico-system/csi-node-driver-2cnjs" May 15 17:59:13.382989 kubelet[2041]: I0515 17:59:13.382972 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f6812bd3-d952-466a-8323-4afab6f4de1a-varrun\") pod \"csi-node-driver-2cnjs\" (UID: \"f6812bd3-d952-466a-8323-4afab6f4de1a\") " pod="calico-system/csi-node-driver-2cnjs" May 15 17:59:13.383191 kubelet[2041]: I0515 17:59:13.383159 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f6812bd3-d952-466a-8323-4afab6f4de1a-registration-dir\") pod \"csi-node-driver-2cnjs\" (UID: \"f6812bd3-d952-466a-8323-4afab6f4de1a\") " pod="calico-system/csi-node-driver-2cnjs" May 15 17:59:13.383307 kubelet[2041]: I0515 17:59:13.383293 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjtxx\" (UniqueName: \"kubernetes.io/projected/f6812bd3-d952-466a-8323-4afab6f4de1a-kube-api-access-tjtxx\") pod \"csi-node-driver-2cnjs\" (UID: \"f6812bd3-d952-466a-8323-4afab6f4de1a\") " pod="calico-system/csi-node-driver-2cnjs" May 15 17:59:13.383411 kubelet[2041]: I0515 17:59:13.383398 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f6812bd3-d952-466a-8323-4afab6f4de1a-kubelet-dir\") pod \"csi-node-driver-2cnjs\" (UID: \"f6812bd3-d952-466a-8323-4afab6f4de1a\") " pod="calico-system/csi-node-driver-2cnjs" May 15 17:59:13.384603 kubelet[2041]: E0515 17:59:13.384590 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.384692 kubelet[2041]: W0515 17:59:13.384678 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.384834 kubelet[2041]: E0515 17:59:13.384810 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.385131 kubelet[2041]: E0515 17:59:13.385119 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.385225 kubelet[2041]: W0515 17:59:13.385212 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.385323 kubelet[2041]: E0515 17:59:13.385310 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.385769 kubelet[2041]: E0515 17:59:13.385757 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.385943 kubelet[2041]: W0515 17:59:13.385919 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.386031 kubelet[2041]: E0515 17:59:13.386019 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.386313 kubelet[2041]: E0515 17:59:13.386301 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.386404 kubelet[2041]: W0515 17:59:13.386389 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.386487 kubelet[2041]: E0515 17:59:13.386475 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.386765 kubelet[2041]: E0515 17:59:13.386753 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.386865 kubelet[2041]: W0515 17:59:13.386852 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.386960 kubelet[2041]: E0515 17:59:13.386948 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.387258 kubelet[2041]: E0515 17:59:13.387246 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.387340 kubelet[2041]: W0515 17:59:13.387327 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.387428 kubelet[2041]: E0515 17:59:13.387416 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.387812 kubelet[2041]: E0515 17:59:13.387718 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.387908 kubelet[2041]: W0515 17:59:13.387894 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.388003 kubelet[2041]: E0515 17:59:13.387991 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.388319 kubelet[2041]: E0515 17:59:13.388307 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.388402 kubelet[2041]: W0515 17:59:13.388389 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.388481 kubelet[2041]: E0515 17:59:13.388469 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.388777 kubelet[2041]: E0515 17:59:13.388766 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.388864 kubelet[2041]: W0515 17:59:13.388852 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.388960 kubelet[2041]: E0515 17:59:13.388934 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.389235 kubelet[2041]: E0515 17:59:13.389223 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.389316 kubelet[2041]: W0515 17:59:13.389304 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.389404 kubelet[2041]: E0515 17:59:13.389392 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.389678 kubelet[2041]: E0515 17:59:13.389667 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.389803 kubelet[2041]: W0515 17:59:13.389790 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.389899 kubelet[2041]: E0515 17:59:13.389888 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.390132 kubelet[2041]: E0515 17:59:13.390121 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.390239 kubelet[2041]: W0515 17:59:13.390227 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.390324 kubelet[2041]: E0515 17:59:13.390311 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.390527 kubelet[2041]: E0515 17:59:13.390501 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.390527 kubelet[2041]: W0515 17:59:13.390524 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.390629 kubelet[2041]: E0515 17:59:13.390549 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.390762 kubelet[2041]: E0515 17:59:13.390716 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.390762 kubelet[2041]: W0515 17:59:13.390742 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.390838 kubelet[2041]: E0515 17:59:13.390752 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.391702 kubelet[2041]: E0515 17:59:13.391691 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.394406 kubelet[2041]: W0515 17:59:13.394380 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.394600 kubelet[2041]: E0515 17:59:13.394583 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.394902 kubelet[2041]: E0515 17:59:13.394876 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.394902 kubelet[2041]: W0515 17:59:13.394900 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.395002 kubelet[2041]: E0515 17:59:13.394927 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.402973 kubelet[2041]: E0515 17:59:13.402880 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.402973 kubelet[2041]: W0515 17:59:13.402906 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.403283 kubelet[2041]: E0515 17:59:13.403263 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.403283 kubelet[2041]: W0515 17:59:13.403277 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.403420 kubelet[2041]: E0515 17:59:13.403401 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.403420 kubelet[2041]: W0515 17:59:13.403415 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.403639 kubelet[2041]: E0515 17:59:13.403621 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.403752 kubelet[2041]: E0515 17:59:13.403725 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.403831 kubelet[2041]: E0515 17:59:13.403819 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.403930 kubelet[2041]: E0515 17:59:13.403870 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.404030 kubelet[2041]: W0515 17:59:13.404014 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.404243 kubelet[2041]: E0515 17:59:13.404215 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.404394 kubelet[2041]: E0515 17:59:13.404382 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.404486 kubelet[2041]: W0515 17:59:13.404473 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.404637 kubelet[2041]: E0515 17:59:13.404602 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.406515 kubelet[2041]: E0515 17:59:13.406501 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.406642 kubelet[2041]: W0515 17:59:13.406629 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.406773 kubelet[2041]: E0515 17:59:13.406727 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.407059 kubelet[2041]: E0515 17:59:13.407047 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.407143 kubelet[2041]: W0515 17:59:13.407131 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.407240 kubelet[2041]: E0515 17:59:13.407228 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.409487 kubelet[2041]: E0515 17:59:13.409471 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.409586 kubelet[2041]: W0515 17:59:13.409572 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.409689 kubelet[2041]: E0515 17:59:13.409676 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.418324 kubelet[2041]: E0515 17:59:13.418294 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.418324 kubelet[2041]: W0515 17:59:13.418321 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.418488 kubelet[2041]: E0515 17:59:13.418342 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.444250 env[1156]: time="2025-05-15T17:59:13.444147982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-c4b668bf4-kp2h4,Uid:7a614419-5238-4114-803d-86c5d35422eb,Namespace:calico-system,Attempt:0,}" May 15 17:59:13.472559 env[1156]: time="2025-05-15T17:59:13.472396301Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:13.472559 env[1156]: time="2025-05-15T17:59:13.472470200Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:13.472559 env[1156]: time="2025-05-15T17:59:13.472493537Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:13.472917 env[1156]: time="2025-05-15T17:59:13.472878347Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d66a83469cf2126cbcd4e39dea95d7bd63b302be54e977f829b82a6c0400a4b pid=2436 runtime=io.containerd.runc.v2 May 15 17:59:13.484319 kubelet[2041]: E0515 17:59:13.484083 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.484319 kubelet[2041]: W0515 17:59:13.484106 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.484319 kubelet[2041]: E0515 17:59:13.484126 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.485636 kubelet[2041]: E0515 17:59:13.485614 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.485636 kubelet[2041]: W0515 17:59:13.485632 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.485780 kubelet[2041]: E0515 17:59:13.485651 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.485989 kubelet[2041]: E0515 17:59:13.485969 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.485989 kubelet[2041]: W0515 17:59:13.485985 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.486208 kubelet[2041]: E0515 17:59:13.486117 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.486261 kubelet[2041]: E0515 17:59:13.486223 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.486261 kubelet[2041]: W0515 17:59:13.486233 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.486421 kubelet[2041]: E0515 17:59:13.486301 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.486622 kubelet[2041]: E0515 17:59:13.486593 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.486622 kubelet[2041]: W0515 17:59:13.486606 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.486622 kubelet[2041]: E0515 17:59:13.486621 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.487250 kubelet[2041]: E0515 17:59:13.487205 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.487250 kubelet[2041]: W0515 17:59:13.487220 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.487250 kubelet[2041]: E0515 17:59:13.487235 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.488296 kubelet[2041]: E0515 17:59:13.488085 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.488296 kubelet[2041]: W0515 17:59:13.488097 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.488296 kubelet[2041]: E0515 17:59:13.488175 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.489525 kubelet[2041]: E0515 17:59:13.489506 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.489525 kubelet[2041]: W0515 17:59:13.489519 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.489727 systemd[1]: Started cri-containerd-2d66a83469cf2126cbcd4e39dea95d7bd63b302be54e977f829b82a6c0400a4b.scope. May 15 17:59:13.495551 kubelet[2041]: E0515 17:59:13.491501 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.495551 kubelet[2041]: W0515 17:59:13.491514 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.495551 kubelet[2041]: E0515 17:59:13.492036 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.495551 kubelet[2041]: W0515 17:59:13.492048 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.495551 kubelet[2041]: E0515 17:59:13.492535 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.495551 kubelet[2041]: W0515 17:59:13.492546 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.495551 kubelet[2041]: E0515 17:59:13.492583 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.495551 kubelet[2041]: E0515 17:59:13.492835 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.495551 kubelet[2041]: E0515 17:59:13.495128 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.495551 kubelet[2041]: E0515 17:59:13.495160 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.496575 kubelet[2041]: E0515 17:59:13.496438 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.496575 kubelet[2041]: W0515 17:59:13.496462 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.496575 kubelet[2041]: E0515 17:59:13.496483 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.497943 kubelet[2041]: E0515 17:59:13.496885 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.497943 kubelet[2041]: W0515 17:59:13.496899 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.497943 kubelet[2041]: E0515 17:59:13.497009 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.497943 kubelet[2041]: E0515 17:59:13.497159 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.497943 kubelet[2041]: W0515 17:59:13.497169 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.497943 kubelet[2041]: E0515 17:59:13.497249 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.497943 kubelet[2041]: E0515 17:59:13.497332 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.497943 kubelet[2041]: W0515 17:59:13.497340 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.497943 kubelet[2041]: E0515 17:59:13.497407 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.497943 kubelet[2041]: E0515 17:59:13.497512 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.498298 kubelet[2041]: W0515 17:59:13.497520 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.498298 kubelet[2041]: E0515 17:59:13.497578 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.498298 kubelet[2041]: E0515 17:59:13.497666 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.498298 kubelet[2041]: W0515 17:59:13.497674 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.498298 kubelet[2041]: E0515 17:59:13.497686 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.498298 kubelet[2041]: E0515 17:59:13.497858 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.498298 kubelet[2041]: W0515 17:59:13.497877 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.498298 kubelet[2041]: E0515 17:59:13.497886 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.499925 kubelet[2041]: E0515 17:59:13.499900 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.499925 kubelet[2041]: W0515 17:59:13.499920 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.500068 kubelet[2041]: E0515 17:59:13.499941 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.502842 kubelet[2041]: E0515 17:59:13.502808 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.502842 kubelet[2041]: W0515 17:59:13.502821 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.502842 kubelet[2041]: E0515 17:59:13.502835 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.503401 kubelet[2041]: E0515 17:59:13.503075 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.503401 kubelet[2041]: W0515 17:59:13.503088 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.503726 kubelet[2041]: E0515 17:59:13.503526 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.504568 kubelet[2041]: E0515 17:59:13.503987 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.504568 kubelet[2041]: W0515 17:59:13.504002 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.504568 kubelet[2041]: E0515 17:59:13.504169 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.504568 kubelet[2041]: W0515 17:59:13.504178 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.504568 kubelet[2041]: E0515 17:59:13.504188 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.504755 kubelet[2041]: E0515 17:59:13.504595 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.504755 kubelet[2041]: W0515 17:59:13.504606 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.504755 kubelet[2041]: E0515 17:59:13.504616 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.504994 kubelet[2041]: E0515 17:59:13.504964 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.505046 kubelet[2041]: E0515 17:59:13.505025 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.505046 kubelet[2041]: W0515 17:59:13.505033 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.505046 kubelet[2041]: E0515 17:59:13.505042 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.508100 kubelet[2041]: E0515 17:59:13.508020 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:13.508100 kubelet[2041]: W0515 17:59:13.508039 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:13.508100 kubelet[2041]: E0515 17:59:13.508058 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:13.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.520000 audit: BPF prog-id=121 op=LOAD May 15 17:59:13.521000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.521000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2436 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363661383334363963663231323663626364346533396465613935 May 15 17:59:13.521000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.521000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2436 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363661383334363963663231323663626364346533396465613935 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit: BPF prog-id=122 op=LOAD May 15 17:59:13.522000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001ddd20 items=0 ppid=2436 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363661383334363963663231323663626364346533396465613935 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.522000 audit: BPF prog-id=123 op=LOAD May 15 17:59:13.522000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001ddd68 items=0 ppid=2436 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363661383334363963663231323663626364346533396465613935 May 15 17:59:13.523000 audit: BPF prog-id=123 op=UNLOAD May 15 17:59:13.523000 audit: BPF prog-id=122 op=UNLOAD May 15 17:59:13.523000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.523000 audit: BPF prog-id=124 op=LOAD May 15 17:59:13.523000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c6178 items=0 ppid=2436 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363661383334363963663231323663626364346533396465613935 May 15 17:59:13.551784 env[1156]: time="2025-05-15T17:59:13.551697227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-c4b668bf4-kp2h4,Uid:7a614419-5238-4114-803d-86c5d35422eb,Namespace:calico-system,Attempt:0,} returns sandbox id \"2d66a83469cf2126cbcd4e39dea95d7bd63b302be54e977f829b82a6c0400a4b\"" May 15 17:59:13.552516 env[1156]: time="2025-05-15T17:59:13.552494173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cqzdd,Uid:25af9776-fc6f-465a-8bf9-72831ee284f1,Namespace:calico-system,Attempt:0,}" May 15 17:59:13.553690 env[1156]: time="2025-05-15T17:59:13.553667305Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 17:59:13.574084 env[1156]: time="2025-05-15T17:59:13.574010780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:13.574268 env[1156]: time="2025-05-15T17:59:13.574245521Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:13.574405 env[1156]: time="2025-05-15T17:59:13.574375491Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:13.574782 env[1156]: time="2025-05-15T17:59:13.574707466Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f pid=2505 runtime=io.containerd.runc.v2 May 15 17:59:13.585686 systemd[1]: Started cri-containerd-5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f.scope. May 15 17:59:13.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.605000 audit: BPF prog-id=125 op=LOAD May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2505 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566343633613964383136396463393964633835373637613634643566 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2505 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566343633613964383136396463393964633835373637613634643566 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit: BPF prog-id=126 op=LOAD May 15 17:59:13.607000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000108940 items=0 ppid=2505 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566343633613964383136396463393964633835373637613634643566 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit: BPF prog-id=127 op=LOAD May 15 17:59:13.607000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000108988 items=0 ppid=2505 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566343633613964383136396463393964633835373637613634643566 May 15 17:59:13.607000 audit: BPF prog-id=127 op=UNLOAD May 15 17:59:13.607000 audit: BPF prog-id=126 op=UNLOAD May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:13.607000 audit: BPF prog-id=128 op=LOAD May 15 17:59:13.607000 audit[2515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000108d98 items=0 ppid=2505 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:13.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566343633613964383136396463393964633835373637613634643566 May 15 17:59:13.625069 env[1156]: time="2025-05-15T17:59:13.625031643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cqzdd,Uid:25af9776-fc6f-465a-8bf9-72831ee284f1,Namespace:calico-system,Attempt:0,} returns sandbox id \"5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f\"" May 15 17:59:14.044000 audit[2542]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:14.044000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff44c1caf0 a2=0 a3=7fff44c1cadc items=0 ppid=2219 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:14.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:14.051000 audit[2542]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:14.051000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff44c1caf0 a2=0 a3=0 items=0 ppid=2219 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:14.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:14.940588 kubelet[2041]: E0515 17:59:14.940511 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:16.940803 kubelet[2041]: E0515 17:59:16.940704 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:17.286051 env[1156]: time="2025-05-15T17:59:17.285982283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:17.291118 env[1156]: time="2025-05-15T17:59:17.291041381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:17.297014 env[1156]: time="2025-05-15T17:59:17.296957516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:17.305720 env[1156]: time="2025-05-15T17:59:17.305644491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:17.309229 env[1156]: time="2025-05-15T17:59:17.307823352Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 17:59:17.312482 env[1156]: time="2025-05-15T17:59:17.312421171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 17:59:17.337971 env[1156]: time="2025-05-15T17:59:17.337924445Z" level=info msg="CreateContainer within sandbox \"2d66a83469cf2126cbcd4e39dea95d7bd63b302be54e977f829b82a6c0400a4b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 17:59:17.367119 env[1156]: time="2025-05-15T17:59:17.367064092Z" level=info msg="CreateContainer within sandbox \"2d66a83469cf2126cbcd4e39dea95d7bd63b302be54e977f829b82a6c0400a4b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d3348baee10e34728b14f499f4a6cc02f62c84b9b8c25c45d3351d88a88d3db3\"" May 15 17:59:17.367849 env[1156]: time="2025-05-15T17:59:17.367826300Z" level=info msg="StartContainer for \"d3348baee10e34728b14f499f4a6cc02f62c84b9b8c25c45d3351d88a88d3db3\"" May 15 17:59:17.391673 systemd[1]: Started cri-containerd-d3348baee10e34728b14f499f4a6cc02f62c84b9b8c25c45d3351d88a88d3db3.scope. May 15 17:59:17.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.438000 audit: BPF prog-id=129 op=LOAD May 15 17:59:17.439000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.439000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2436 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:17.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333438626165653130653334373238623134663439396634613663 May 15 17:59:17.439000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.439000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2436 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:17.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333438626165653130653334373238623134663439396634613663 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.440000 audit: BPF prog-id=130 op=LOAD May 15 17:59:17.440000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d1ed0 items=0 ppid=2436 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:17.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333438626165653130653334373238623134663439396634613663 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit: BPF prog-id=131 op=LOAD May 15 17:59:17.441000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d1f18 items=0 ppid=2436 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:17.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333438626165653130653334373238623134663439396634613663 May 15 17:59:17.441000 audit: BPF prog-id=131 op=UNLOAD May 15 17:59:17.441000 audit: BPF prog-id=130 op=UNLOAD May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:17.441000 audit: BPF prog-id=132 op=LOAD May 15 17:59:17.441000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039a328 items=0 ppid=2436 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:17.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333438626165653130653334373238623134663439396634613663 May 15 17:59:17.481800 env[1156]: time="2025-05-15T17:59:17.481746865Z" level=info msg="StartContainer for \"d3348baee10e34728b14f499f4a6cc02f62c84b9b8c25c45d3351d88a88d3db3\" returns successfully" May 15 17:59:18.099018 kubelet[2041]: E0515 17:59:18.098952 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.099018 kubelet[2041]: W0515 17:59:18.099000 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.099796 kubelet[2041]: E0515 17:59:18.099090 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.099796 kubelet[2041]: E0515 17:59:18.099541 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.099796 kubelet[2041]: W0515 17:59:18.099563 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.099796 kubelet[2041]: E0515 17:59:18.099587 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.101974 kubelet[2041]: E0515 17:59:18.101934 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.102162 kubelet[2041]: W0515 17:59:18.102129 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.102334 kubelet[2041]: E0515 17:59:18.102304 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.102872 kubelet[2041]: E0515 17:59:18.102846 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.103032 kubelet[2041]: W0515 17:59:18.103005 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.103197 kubelet[2041]: E0515 17:59:18.103170 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.103644 kubelet[2041]: E0515 17:59:18.103618 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.103866 kubelet[2041]: W0515 17:59:18.103836 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.104034 kubelet[2041]: E0515 17:59:18.104007 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.104485 kubelet[2041]: E0515 17:59:18.104459 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.104653 kubelet[2041]: W0515 17:59:18.104626 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.104892 kubelet[2041]: E0515 17:59:18.104863 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.105337 kubelet[2041]: E0515 17:59:18.105311 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.105493 kubelet[2041]: W0515 17:59:18.105467 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.105714 kubelet[2041]: E0515 17:59:18.105685 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.106313 kubelet[2041]: E0515 17:59:18.106286 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.106481 kubelet[2041]: W0515 17:59:18.106455 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.106641 kubelet[2041]: E0515 17:59:18.106615 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.107327 kubelet[2041]: E0515 17:59:18.107301 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.107505 kubelet[2041]: W0515 17:59:18.107477 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.107648 kubelet[2041]: E0515 17:59:18.107623 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.108417 kubelet[2041]: E0515 17:59:18.108390 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.108601 kubelet[2041]: W0515 17:59:18.108573 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.108844 kubelet[2041]: E0515 17:59:18.108814 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.109263 kubelet[2041]: E0515 17:59:18.109238 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.109440 kubelet[2041]: W0515 17:59:18.109413 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.109635 kubelet[2041]: E0515 17:59:18.109607 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.110166 kubelet[2041]: E0515 17:59:18.110140 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.110321 kubelet[2041]: W0515 17:59:18.110296 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.110498 kubelet[2041]: E0515 17:59:18.110471 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.110970 kubelet[2041]: E0515 17:59:18.110944 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.111147 kubelet[2041]: W0515 17:59:18.111120 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.111294 kubelet[2041]: E0515 17:59:18.111269 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.111698 kubelet[2041]: E0515 17:59:18.111673 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.111976 kubelet[2041]: W0515 17:59:18.111947 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.112144 kubelet[2041]: E0515 17:59:18.112118 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.113794 kubelet[2041]: E0515 17:59:18.113716 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.113981 kubelet[2041]: W0515 17:59:18.113953 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.114139 kubelet[2041]: E0515 17:59:18.114113 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.127960 kubelet[2041]: E0515 17:59:18.127924 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.128155 kubelet[2041]: W0515 17:59:18.128127 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.128331 kubelet[2041]: E0515 17:59:18.128302 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.128932 kubelet[2041]: E0515 17:59:18.128904 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.129116 kubelet[2041]: W0515 17:59:18.129087 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.129294 kubelet[2041]: E0515 17:59:18.129266 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.129852 kubelet[2041]: E0515 17:59:18.129801 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.129965 kubelet[2041]: W0515 17:59:18.129848 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.129965 kubelet[2041]: E0515 17:59:18.129896 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.130379 kubelet[2041]: E0515 17:59:18.130322 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.130379 kubelet[2041]: W0515 17:59:18.130357 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.130379 kubelet[2041]: E0515 17:59:18.130391 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.130969 kubelet[2041]: E0515 17:59:18.130935 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.130969 kubelet[2041]: W0515 17:59:18.130964 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.131178 kubelet[2041]: E0515 17:59:18.131136 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.131515 kubelet[2041]: E0515 17:59:18.131484 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.131515 kubelet[2041]: W0515 17:59:18.131511 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.131811 kubelet[2041]: E0515 17:59:18.131680 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.132183 kubelet[2041]: E0515 17:59:18.132125 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.132183 kubelet[2041]: W0515 17:59:18.132162 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.132450 kubelet[2041]: E0515 17:59:18.132417 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.132878 kubelet[2041]: E0515 17:59:18.132845 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.132878 kubelet[2041]: W0515 17:59:18.132873 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.133069 kubelet[2041]: E0515 17:59:18.132906 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.133915 kubelet[2041]: E0515 17:59:18.133861 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.133915 kubelet[2041]: W0515 17:59:18.133893 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.134194 kubelet[2041]: E0515 17:59:18.134159 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.134590 kubelet[2041]: E0515 17:59:18.134548 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.134590 kubelet[2041]: W0515 17:59:18.134575 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.134828 kubelet[2041]: E0515 17:59:18.134707 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.135256 kubelet[2041]: E0515 17:59:18.135222 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.135256 kubelet[2041]: W0515 17:59:18.135250 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.135451 kubelet[2041]: E0515 17:59:18.135304 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.135844 kubelet[2041]: E0515 17:59:18.135810 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.135844 kubelet[2041]: W0515 17:59:18.135839 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.136030 kubelet[2041]: E0515 17:59:18.135889 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.136478 kubelet[2041]: E0515 17:59:18.136444 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.136478 kubelet[2041]: W0515 17:59:18.136475 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.136656 kubelet[2041]: E0515 17:59:18.136609 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.137621 kubelet[2041]: E0515 17:59:18.137585 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.137621 kubelet[2041]: W0515 17:59:18.137616 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.138009 kubelet[2041]: E0515 17:59:18.137670 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.138357 kubelet[2041]: E0515 17:59:18.138322 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.138357 kubelet[2041]: W0515 17:59:18.138352 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.138676 kubelet[2041]: E0515 17:59:18.138633 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.139092 kubelet[2041]: E0515 17:59:18.139054 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.139092 kubelet[2041]: W0515 17:59:18.139088 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.139266 kubelet[2041]: E0515 17:59:18.139122 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.139603 kubelet[2041]: E0515 17:59:18.139570 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.139603 kubelet[2041]: W0515 17:59:18.139599 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.139936 kubelet[2041]: E0515 17:59:18.139623 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.140359 kubelet[2041]: E0515 17:59:18.140325 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:18.140359 kubelet[2041]: W0515 17:59:18.140355 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:18.140530 kubelet[2041]: E0515 17:59:18.140378 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:18.943021 kubelet[2041]: E0515 17:59:18.940335 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:19.088839 kubelet[2041]: I0515 17:59:19.088788 2041 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 17:59:19.120803 kubelet[2041]: E0515 17:59:19.120688 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.120803 kubelet[2041]: W0515 17:59:19.120729 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.120803 kubelet[2041]: E0515 17:59:19.120806 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.121589 kubelet[2041]: E0515 17:59:19.121285 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.121589 kubelet[2041]: W0515 17:59:19.121307 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.121589 kubelet[2041]: E0515 17:59:19.121329 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.121918 kubelet[2041]: E0515 17:59:19.121724 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.121918 kubelet[2041]: W0515 17:59:19.121776 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.121918 kubelet[2041]: E0515 17:59:19.121798 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.122215 kubelet[2041]: E0515 17:59:19.122183 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.122215 kubelet[2041]: W0515 17:59:19.122212 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.122387 kubelet[2041]: E0515 17:59:19.122234 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.122671 kubelet[2041]: E0515 17:59:19.122637 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.122671 kubelet[2041]: W0515 17:59:19.122667 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.122972 kubelet[2041]: E0515 17:59:19.122689 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.123220 kubelet[2041]: E0515 17:59:19.123132 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.123318 kubelet[2041]: W0515 17:59:19.123222 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.123318 kubelet[2041]: E0515 17:59:19.123250 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.124070 kubelet[2041]: E0515 17:59:19.123648 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.124070 kubelet[2041]: W0515 17:59:19.123671 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.124070 kubelet[2041]: E0515 17:59:19.123692 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.124300 kubelet[2041]: E0515 17:59:19.124092 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.124300 kubelet[2041]: W0515 17:59:19.124113 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.124300 kubelet[2041]: E0515 17:59:19.124134 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.124631 kubelet[2041]: E0515 17:59:19.124599 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.124631 kubelet[2041]: W0515 17:59:19.124629 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.124906 kubelet[2041]: E0515 17:59:19.124652 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.125175 kubelet[2041]: E0515 17:59:19.125143 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.125175 kubelet[2041]: W0515 17:59:19.125172 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.125356 kubelet[2041]: E0515 17:59:19.125194 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.125606 kubelet[2041]: E0515 17:59:19.125574 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.125606 kubelet[2041]: W0515 17:59:19.125603 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.125887 kubelet[2041]: E0515 17:59:19.125644 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.126118 kubelet[2041]: E0515 17:59:19.126088 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.126118 kubelet[2041]: W0515 17:59:19.126115 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.126376 kubelet[2041]: E0515 17:59:19.126136 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.126647 kubelet[2041]: E0515 17:59:19.126615 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.126647 kubelet[2041]: W0515 17:59:19.126643 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.126895 kubelet[2041]: E0515 17:59:19.126667 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.127108 kubelet[2041]: E0515 17:59:19.127077 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.127108 kubelet[2041]: W0515 17:59:19.127105 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.127270 kubelet[2041]: E0515 17:59:19.127127 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.127584 kubelet[2041]: E0515 17:59:19.127552 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.127584 kubelet[2041]: W0515 17:59:19.127581 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.127801 kubelet[2041]: E0515 17:59:19.127604 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.140441 kubelet[2041]: E0515 17:59:19.139668 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.140441 kubelet[2041]: W0515 17:59:19.139708 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.140441 kubelet[2041]: E0515 17:59:19.139875 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.140441 kubelet[2041]: E0515 17:59:19.140271 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.140441 kubelet[2041]: W0515 17:59:19.140292 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.140441 kubelet[2041]: E0515 17:59:19.140327 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.141085 kubelet[2041]: E0515 17:59:19.140774 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.141085 kubelet[2041]: W0515 17:59:19.140804 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.141085 kubelet[2041]: E0515 17:59:19.140848 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.141283 kubelet[2041]: E0515 17:59:19.141179 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.141283 kubelet[2041]: W0515 17:59:19.141200 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.141283 kubelet[2041]: E0515 17:59:19.141222 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.141594 kubelet[2041]: E0515 17:59:19.141553 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.141594 kubelet[2041]: W0515 17:59:19.141582 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.141875 kubelet[2041]: E0515 17:59:19.141808 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.142071 kubelet[2041]: E0515 17:59:19.142040 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.142071 kubelet[2041]: W0515 17:59:19.142066 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.142265 kubelet[2041]: E0515 17:59:19.142244 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.142569 kubelet[2041]: E0515 17:59:19.142537 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.142569 kubelet[2041]: W0515 17:59:19.142564 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.142833 kubelet[2041]: E0515 17:59:19.142787 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.143078 kubelet[2041]: E0515 17:59:19.143024 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.143078 kubelet[2041]: W0515 17:59:19.143059 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.143247 kubelet[2041]: E0515 17:59:19.143092 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.144495 kubelet[2041]: E0515 17:59:19.143805 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.144495 kubelet[2041]: W0515 17:59:19.143834 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.144495 kubelet[2041]: E0515 17:59:19.143874 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.144495 kubelet[2041]: E0515 17:59:19.144187 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.144495 kubelet[2041]: W0515 17:59:19.144207 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.144495 kubelet[2041]: E0515 17:59:19.144236 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.145174 kubelet[2041]: E0515 17:59:19.144526 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.145174 kubelet[2041]: W0515 17:59:19.144546 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.145174 kubelet[2041]: E0515 17:59:19.144566 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.145174 kubelet[2041]: E0515 17:59:19.144951 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.145174 kubelet[2041]: W0515 17:59:19.144971 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.145174 kubelet[2041]: E0515 17:59:19.144992 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.145588 kubelet[2041]: E0515 17:59:19.145546 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.145588 kubelet[2041]: W0515 17:59:19.145580 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.145975 kubelet[2041]: E0515 17:59:19.145936 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.146189 kubelet[2041]: E0515 17:59:19.146149 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.146189 kubelet[2041]: W0515 17:59:19.146183 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.146444 kubelet[2041]: E0515 17:59:19.146414 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.146595 kubelet[2041]: E0515 17:59:19.146479 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.146824 kubelet[2041]: W0515 17:59:19.146710 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.147067 kubelet[2041]: E0515 17:59:19.147018 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.147514 kubelet[2041]: E0515 17:59:19.147449 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.147514 kubelet[2041]: W0515 17:59:19.147485 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.147514 kubelet[2041]: E0515 17:59:19.147508 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.147975 kubelet[2041]: E0515 17:59:19.147916 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.147975 kubelet[2041]: W0515 17:59:19.147953 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.147975 kubelet[2041]: E0515 17:59:19.147974 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.148838 kubelet[2041]: E0515 17:59:19.148780 2041 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:59:19.148838 kubelet[2041]: W0515 17:59:19.148835 2041 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:59:19.149035 kubelet[2041]: E0515 17:59:19.148858 2041 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:59:19.571823 env[1156]: time="2025-05-15T17:59:19.571495741Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:19.574689 env[1156]: time="2025-05-15T17:59:19.574631239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:19.578214 env[1156]: time="2025-05-15T17:59:19.578176442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:19.582409 env[1156]: time="2025-05-15T17:59:19.582384140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:19.583897 env[1156]: time="2025-05-15T17:59:19.583831766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 17:59:19.590564 env[1156]: time="2025-05-15T17:59:19.590535823Z" level=info msg="CreateContainer within sandbox \"5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 17:59:19.617999 env[1156]: time="2025-05-15T17:59:19.617917737Z" level=info msg="CreateContainer within sandbox \"5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd\"" May 15 17:59:19.618945 env[1156]: time="2025-05-15T17:59:19.618914567Z" level=info msg="StartContainer for \"a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd\"" May 15 17:59:19.663219 systemd[1]: Started cri-containerd-a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd.scope. May 15 17:59:19.680230 systemd[1]: run-containerd-runc-k8s.io-a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd-runc.Y7IN5f.mount: Deactivated successfully. May 15 17:59:19.697000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.699442 kernel: kauditd_printk_skb: 179 callbacks suppressed May 15 17:59:19.699493 kernel: audit: type=1400 audit(1747331959.697:995): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.697000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4d792dbcc8 items=0 ppid=2505 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:19.711789 kernel: audit: type=1300 audit(1747331959.697:995): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4d792dbcc8 items=0 ppid=2505 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:19.711850 kernel: audit: type=1327 audit(1747331959.697:995): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138316137356335303865333037613364636236306266653435313636 May 15 17:59:19.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138316137356335303865333037613364636236306266653435313636 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.723155 kernel: audit: type=1400 audit(1747331959.703:996): avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.728180 kernel: audit: type=1400 audit(1747331959.703:996): avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.733117 kernel: audit: type=1400 audit(1747331959.703:996): avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.739793 kernel: audit: type=1400 audit(1747331959.703:996): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.761484 kernel: audit: type=1400 audit(1747331959.703:996): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.761608 kernel: audit: type=1400 audit(1747331959.703:996): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.773834 kernel: audit: type=1400 audit(1747331959.703:996): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit: BPF prog-id=133 op=LOAD May 15 17:59:19.703000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000285738 items=0 ppid=2505 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:19.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138316137356335303865333037613364636236306266653435313636 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit: BPF prog-id=134 op=LOAD May 15 17:59:19.703000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000285788 items=0 ppid=2505 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:19.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138316137356335303865333037613364636236306266653435313636 May 15 17:59:19.703000 audit: BPF prog-id=134 op=UNLOAD May 15 17:59:19.703000 audit: BPF prog-id=133 op=UNLOAD May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:19.703000 audit: BPF prog-id=135 op=LOAD May 15 17:59:19.703000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000285818 items=0 ppid=2505 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:19.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138316137356335303865333037613364636236306266653435313636 May 15 17:59:19.774588 systemd[1]: cri-containerd-a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd.scope: Deactivated successfully. May 15 17:59:19.777000 audit: BPF prog-id=135 op=UNLOAD May 15 17:59:19.779936 env[1156]: time="2025-05-15T17:59:19.779603431Z" level=info msg="StartContainer for \"a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd\" returns successfully" May 15 17:59:19.799898 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd-rootfs.mount: Deactivated successfully. May 15 17:59:20.318152 kubelet[2041]: I0515 17:59:20.318021 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-c4b668bf4-kp2h4" podStartSLOduration=3.5596187009999998 podStartE2EDuration="7.317947433s" podCreationTimestamp="2025-05-15 17:59:13 +0000 UTC" firstStartedPulling="2025-05-15 17:59:13.553317615 +0000 UTC m=+21.767856037" lastFinishedPulling="2025-05-15 17:59:17.311646347 +0000 UTC m=+25.526184769" observedRunningTime="2025-05-15 17:59:18.116203386 +0000 UTC m=+26.330741888" watchObservedRunningTime="2025-05-15 17:59:20.317947433 +0000 UTC m=+28.532485905" May 15 17:59:20.563175 env[1156]: time="2025-05-15T17:59:20.562641580Z" level=info msg="shim disconnected" id=a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd May 15 17:59:20.563175 env[1156]: time="2025-05-15T17:59:20.562793371Z" level=warning msg="cleaning up after shim disconnected" id=a81a75c508e307a3dcb60bfe4516690af10468ca6d77357554cde6f7ed6421fd namespace=k8s.io May 15 17:59:20.563175 env[1156]: time="2025-05-15T17:59:20.562821406Z" level=info msg="cleaning up dead shim" May 15 17:59:20.579268 env[1156]: time="2025-05-15T17:59:20.578627474Z" level=warning msg="cleanup warnings time=\"2025-05-15T17:59:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2697 runtime=io.containerd.runc.v2\n" May 15 17:59:20.878452 kubelet[2041]: I0515 17:59:20.878082 2041 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 17:59:20.943149 kubelet[2041]: E0515 17:59:20.940070 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:20.978000 audit[2712]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:20.978000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc6e184b30 a2=0 a3=7ffc6e184b1c items=0 ppid=2219 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:20.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:20.982000 audit[2712]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:20.982000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc6e184b30 a2=0 a3=7ffc6e184b1c items=0 ppid=2219 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:20.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:21.100223 env[1156]: time="2025-05-15T17:59:21.099936286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 17:59:22.940724 kubelet[2041]: E0515 17:59:22.940597 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:24.941348 kubelet[2041]: E0515 17:59:24.941056 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:26.941565 kubelet[2041]: E0515 17:59:26.941403 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:28.652334 env[1156]: time="2025-05-15T17:59:28.652292708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:28.655908 env[1156]: time="2025-05-15T17:59:28.655883245Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:28.664142 env[1156]: time="2025-05-15T17:59:28.664018213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:28.667516 env[1156]: time="2025-05-15T17:59:28.667483684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:28.669224 env[1156]: time="2025-05-15T17:59:28.669101703Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 17:59:28.679284 env[1156]: time="2025-05-15T17:59:28.679211833Z" level=info msg="CreateContainer within sandbox \"5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 17:59:28.694316 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4201432095.mount: Deactivated successfully. May 15 17:59:28.706156 env[1156]: time="2025-05-15T17:59:28.706036201Z" level=info msg="CreateContainer within sandbox \"5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477\"" May 15 17:59:28.710479 env[1156]: time="2025-05-15T17:59:28.710386542Z" level=info msg="StartContainer for \"eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477\"" May 15 17:59:28.753311 systemd[1]: Started cri-containerd-eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477.scope. May 15 17:59:28.770000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.772951 kernel: kauditd_printk_skb: 40 callbacks suppressed May 15 17:59:28.773004 kernel: audit: type=1400 audit(1747331968.770:1004): avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3d3046f028 items=0 ppid=2505 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:28.784817 kernel: audit: type=1300 audit(1747331968.770:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3d3046f028 items=0 ppid=2505 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:28.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383937323436373863383232303361306433646130626534356564 May 15 17:59:28.793780 kernel: audit: type=1327 audit(1747331968.770:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383937323436373863383232303361306433646130626534356564 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.804777 kernel: audit: type=1400 audit(1747331968.770:1005): avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.804857 kernel: audit: type=1400 audit(1747331968.770:1005): avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.809877 kernel: audit: type=1400 audit(1747331968.770:1005): avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.814915 kernel: audit: type=1400 audit(1747331968.770:1005): avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.819972 kernel: audit: type=1400 audit(1747331968.770:1005): avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.825088 kernel: audit: type=1400 audit(1747331968.770:1005): avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.829928 kernel: audit: type=1400 audit(1747331968.770:1005): avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.770000 audit: BPF prog-id=136 op=LOAD May 15 17:59:28.770000 audit[2721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003f41f8 items=0 ppid=2505 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:28.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383937323436373863383232303361306433646130626534356564 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.776000 audit: BPF prog-id=137 op=LOAD May 15 17:59:28.776000 audit[2721]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003f4248 items=0 ppid=2505 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:28.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383937323436373863383232303361306433646130626534356564 May 15 17:59:28.784000 audit: BPF prog-id=137 op=UNLOAD May 15 17:59:28.784000 audit: BPF prog-id=136 op=UNLOAD May 15 17:59:28.784000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:28.784000 audit: BPF prog-id=138 op=LOAD May 15 17:59:28.784000 audit[2721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003f42d8 items=0 ppid=2505 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:28.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383937323436373863383232303361306433646130626534356564 May 15 17:59:28.832944 env[1156]: time="2025-05-15T17:59:28.832904719Z" level=info msg="StartContainer for \"eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477\" returns successfully" May 15 17:59:28.940365 kubelet[2041]: E0515 17:59:28.940222 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:29.696550 systemd[1]: run-containerd-runc-k8s.io-eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477-runc.Py6p39.mount: Deactivated successfully. May 15 17:59:30.194013 systemd[1]: cri-containerd-eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477.scope: Deactivated successfully. May 15 17:59:30.197000 audit: BPF prog-id=138 op=UNLOAD May 15 17:59:30.231339 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477-rootfs.mount: Deactivated successfully. May 15 17:59:30.239682 kubelet[2041]: I0515 17:59:30.239652 2041 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 17:59:30.574814 kubelet[2041]: I0515 17:59:30.574686 2041 topology_manager.go:215] "Topology Admit Handler" podUID="bbc51e4d-e705-4cb0-b394-204802a51d29" podNamespace="calico-apiserver" podName="calico-apiserver-667fcfb984-4gvrr" May 15 17:59:30.577674 kubelet[2041]: I0515 17:59:30.577618 2041 topology_manager.go:215] "Topology Admit Handler" podUID="553cc4bb-81bc-4c56-9d31-50bba5210009" podNamespace="kube-system" podName="coredns-7db6d8ff4d-pb597" May 15 17:59:30.581616 kubelet[2041]: I0515 17:59:30.581193 2041 topology_manager.go:215] "Topology Admit Handler" podUID="8031d6c5-d59f-4cb4-803d-ea905d3adb6a" podNamespace="calico-apiserver" podName="calico-apiserver-667fcfb984-rh9xh" May 15 17:59:30.582608 kubelet[2041]: I0515 17:59:30.582565 2041 topology_manager.go:215] "Topology Admit Handler" podUID="2d806229-6a1c-421d-88bd-29bba40b9da0" podNamespace="kube-system" podName="coredns-7db6d8ff4d-zl6zm" May 15 17:59:30.591093 systemd[1]: Created slice kubepods-besteffort-podbbc51e4d_e705_4cb0_b394_204802a51d29.slice. May 15 17:59:30.602950 kubelet[2041]: I0515 17:59:30.602551 2041 topology_manager.go:215] "Topology Admit Handler" podUID="2d177649-dd03-410c-bb37-8159f7697b6b" podNamespace="calico-system" podName="calico-kube-controllers-7c9d79cc5c-vzr74" May 15 17:59:30.617195 systemd[1]: Created slice kubepods-burstable-pod2d806229_6a1c_421d_88bd_29bba40b9da0.slice. May 15 17:59:30.625085 systemd[1]: Created slice kubepods-burstable-pod553cc4bb_81bc_4c56_9d31_50bba5210009.slice. May 15 17:59:30.635046 systemd[1]: Created slice kubepods-besteffort-pod8031d6c5_d59f_4cb4_803d_ea905d3adb6a.slice. May 15 17:59:30.638312 systemd[1]: Created slice kubepods-besteffort-pod2d177649_dd03_410c_bb37_8159f7697b6b.slice. May 15 17:59:30.647234 kubelet[2041]: I0515 17:59:30.647213 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2d177649-dd03-410c-bb37-8159f7697b6b-tigera-ca-bundle\") pod \"calico-kube-controllers-7c9d79cc5c-vzr74\" (UID: \"2d177649-dd03-410c-bb37-8159f7697b6b\") " pod="calico-system/calico-kube-controllers-7c9d79cc5c-vzr74" May 15 17:59:30.647370 kubelet[2041]: I0515 17:59:30.647353 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bbc51e4d-e705-4cb0-b394-204802a51d29-calico-apiserver-certs\") pod \"calico-apiserver-667fcfb984-4gvrr\" (UID: \"bbc51e4d-e705-4cb0-b394-204802a51d29\") " pod="calico-apiserver/calico-apiserver-667fcfb984-4gvrr" May 15 17:59:30.647473 kubelet[2041]: I0515 17:59:30.647457 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t4995\" (UniqueName: \"kubernetes.io/projected/bbc51e4d-e705-4cb0-b394-204802a51d29-kube-api-access-t4995\") pod \"calico-apiserver-667fcfb984-4gvrr\" (UID: \"bbc51e4d-e705-4cb0-b394-204802a51d29\") " pod="calico-apiserver/calico-apiserver-667fcfb984-4gvrr" May 15 17:59:30.647582 kubelet[2041]: I0515 17:59:30.647565 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pkd5p\" (UniqueName: \"kubernetes.io/projected/2d177649-dd03-410c-bb37-8159f7697b6b-kube-api-access-pkd5p\") pod \"calico-kube-controllers-7c9d79cc5c-vzr74\" (UID: \"2d177649-dd03-410c-bb37-8159f7697b6b\") " pod="calico-system/calico-kube-controllers-7c9d79cc5c-vzr74" May 15 17:59:30.647685 kubelet[2041]: I0515 17:59:30.647669 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/553cc4bb-81bc-4c56-9d31-50bba5210009-config-volume\") pod \"coredns-7db6d8ff4d-pb597\" (UID: \"553cc4bb-81bc-4c56-9d31-50bba5210009\") " pod="kube-system/coredns-7db6d8ff4d-pb597" May 15 17:59:30.647823 kubelet[2041]: I0515 17:59:30.647807 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6dblf\" (UniqueName: \"kubernetes.io/projected/553cc4bb-81bc-4c56-9d31-50bba5210009-kube-api-access-6dblf\") pod \"coredns-7db6d8ff4d-pb597\" (UID: \"553cc4bb-81bc-4c56-9d31-50bba5210009\") " pod="kube-system/coredns-7db6d8ff4d-pb597" May 15 17:59:30.647916 kubelet[2041]: I0515 17:59:30.647902 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d65d8\" (UniqueName: \"kubernetes.io/projected/8031d6c5-d59f-4cb4-803d-ea905d3adb6a-kube-api-access-d65d8\") pod \"calico-apiserver-667fcfb984-rh9xh\" (UID: \"8031d6c5-d59f-4cb4-803d-ea905d3adb6a\") " pod="calico-apiserver/calico-apiserver-667fcfb984-rh9xh" May 15 17:59:30.648058 kubelet[2041]: I0515 17:59:30.648036 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8031d6c5-d59f-4cb4-803d-ea905d3adb6a-calico-apiserver-certs\") pod \"calico-apiserver-667fcfb984-rh9xh\" (UID: \"8031d6c5-d59f-4cb4-803d-ea905d3adb6a\") " pod="calico-apiserver/calico-apiserver-667fcfb984-rh9xh" May 15 17:59:30.648170 kubelet[2041]: I0515 17:59:30.648154 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2d806229-6a1c-421d-88bd-29bba40b9da0-config-volume\") pod \"coredns-7db6d8ff4d-zl6zm\" (UID: \"2d806229-6a1c-421d-88bd-29bba40b9da0\") " pod="kube-system/coredns-7db6d8ff4d-zl6zm" May 15 17:59:30.648268 kubelet[2041]: I0515 17:59:30.648254 2041 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k5d8t\" (UniqueName: \"kubernetes.io/projected/2d806229-6a1c-421d-88bd-29bba40b9da0-kube-api-access-k5d8t\") pod \"coredns-7db6d8ff4d-zl6zm\" (UID: \"2d806229-6a1c-421d-88bd-29bba40b9da0\") " pod="kube-system/coredns-7db6d8ff4d-zl6zm" May 15 17:59:30.957421 systemd[1]: Created slice kubepods-besteffort-podf6812bd3_d952_466a_8323_4afab6f4de1a.slice. May 15 17:59:30.968832 env[1156]: time="2025-05-15T17:59:30.968570838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2cnjs,Uid:f6812bd3-d952-466a-8323-4afab6f4de1a,Namespace:calico-system,Attempt:0,}" May 15 17:59:31.343204 env[1156]: time="2025-05-15T17:59:31.343079784Z" level=info msg="shim disconnected" id=eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477 May 15 17:59:31.343204 env[1156]: time="2025-05-15T17:59:31.343167436Z" level=warning msg="cleaning up after shim disconnected" id=eb89724678c82203a0d3da0be45edc851ab9e2c8b81460237e3114729c3e6477 namespace=k8s.io May 15 17:59:31.343204 env[1156]: time="2025-05-15T17:59:31.343200010Z" level=info msg="cleaning up dead shim" May 15 17:59:31.357511 env[1156]: time="2025-05-15T17:59:31.357448209Z" level=warning msg="cleanup warnings time=\"2025-05-15T17:59:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2770 runtime=io.containerd.runc.v2\n" May 15 17:59:31.440568 env[1156]: time="2025-05-15T17:59:31.440495161Z" level=error msg="Failed to destroy network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.440935 env[1156]: time="2025-05-15T17:59:31.440898672Z" level=error msg="encountered an error cleaning up failed sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.441026 env[1156]: time="2025-05-15T17:59:31.440977196Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2cnjs,Uid:f6812bd3-d952-466a-8323-4afab6f4de1a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.442100 kubelet[2041]: E0515 17:59:31.441347 2041 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.442100 kubelet[2041]: E0515 17:59:31.441523 2041 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2cnjs" May 15 17:59:31.442100 kubelet[2041]: E0515 17:59:31.441574 2041 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2cnjs" May 15 17:59:31.442435 kubelet[2041]: E0515 17:59:31.441999 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2cnjs_calico-system(f6812bd3-d952-466a-8323-4afab6f4de1a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2cnjs_calico-system(f6812bd3-d952-466a-8323-4afab6f4de1a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:31.510955 env[1156]: time="2025-05-15T17:59:31.510876243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-667fcfb984-4gvrr,Uid:bbc51e4d-e705-4cb0-b394-204802a51d29,Namespace:calico-apiserver,Attempt:0,}" May 15 17:59:31.525450 env[1156]: time="2025-05-15T17:59:31.525370225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zl6zm,Uid:2d806229-6a1c-421d-88bd-29bba40b9da0,Namespace:kube-system,Attempt:0,}" May 15 17:59:31.533169 env[1156]: time="2025-05-15T17:59:31.533086916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pb597,Uid:553cc4bb-81bc-4c56-9d31-50bba5210009,Namespace:kube-system,Attempt:0,}" May 15 17:59:31.549519 env[1156]: time="2025-05-15T17:59:31.549419199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c9d79cc5c-vzr74,Uid:2d177649-dd03-410c-bb37-8159f7697b6b,Namespace:calico-system,Attempt:0,}" May 15 17:59:31.550860 env[1156]: time="2025-05-15T17:59:31.550727834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-667fcfb984-rh9xh,Uid:8031d6c5-d59f-4cb4-803d-ea905d3adb6a,Namespace:calico-apiserver,Attempt:0,}" May 15 17:59:31.709948 env[1156]: time="2025-05-15T17:59:31.709309406Z" level=error msg="Failed to destroy network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.710721 env[1156]: time="2025-05-15T17:59:31.710650464Z" level=error msg="encountered an error cleaning up failed sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.710875 env[1156]: time="2025-05-15T17:59:31.710793765Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-667fcfb984-4gvrr,Uid:bbc51e4d-e705-4cb0-b394-204802a51d29,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.711537 kubelet[2041]: E0515 17:59:31.711469 2041 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.711617 kubelet[2041]: E0515 17:59:31.711564 2041 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-667fcfb984-4gvrr" May 15 17:59:31.711662 kubelet[2041]: E0515 17:59:31.711608 2041 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-667fcfb984-4gvrr" May 15 17:59:31.713215 kubelet[2041]: E0515 17:59:31.713154 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-667fcfb984-4gvrr_calico-apiserver(bbc51e4d-e705-4cb0-b394-204802a51d29)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-667fcfb984-4gvrr_calico-apiserver(bbc51e4d-e705-4cb0-b394-204802a51d29)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-667fcfb984-4gvrr" podUID="bbc51e4d-e705-4cb0-b394-204802a51d29" May 15 17:59:31.749673 env[1156]: time="2025-05-15T17:59:31.749592461Z" level=error msg="Failed to destroy network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.750075 env[1156]: time="2025-05-15T17:59:31.750030539Z" level=error msg="encountered an error cleaning up failed sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.750130 env[1156]: time="2025-05-15T17:59:31.750094756Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zl6zm,Uid:2d806229-6a1c-421d-88bd-29bba40b9da0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.750791 kubelet[2041]: E0515 17:59:31.750375 2041 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.750791 kubelet[2041]: E0515 17:59:31.750448 2041 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-zl6zm" May 15 17:59:31.750791 kubelet[2041]: E0515 17:59:31.750473 2041 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-zl6zm" May 15 17:59:31.750961 kubelet[2041]: E0515 17:59:31.750530 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-zl6zm_kube-system(2d806229-6a1c-421d-88bd-29bba40b9da0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-zl6zm_kube-system(2d806229-6a1c-421d-88bd-29bba40b9da0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-zl6zm" podUID="2d806229-6a1c-421d-88bd-29bba40b9da0" May 15 17:59:31.770608 env[1156]: time="2025-05-15T17:59:31.770550519Z" level=error msg="Failed to destroy network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.772906 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d-shm.mount: Deactivated successfully. May 15 17:59:31.774405 env[1156]: time="2025-05-15T17:59:31.774361927Z" level=error msg="encountered an error cleaning up failed sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.774482 env[1156]: time="2025-05-15T17:59:31.774435141Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-667fcfb984-rh9xh,Uid:8031d6c5-d59f-4cb4-803d-ea905d3adb6a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.774769 kubelet[2041]: E0515 17:59:31.774676 2041 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.775192 kubelet[2041]: E0515 17:59:31.774746 2041 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-667fcfb984-rh9xh" May 15 17:59:31.775192 kubelet[2041]: E0515 17:59:31.774907 2041 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-667fcfb984-rh9xh" May 15 17:59:31.775192 kubelet[2041]: E0515 17:59:31.774961 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-667fcfb984-rh9xh_calico-apiserver(8031d6c5-d59f-4cb4-803d-ea905d3adb6a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-667fcfb984-rh9xh_calico-apiserver(8031d6c5-d59f-4cb4-803d-ea905d3adb6a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-667fcfb984-rh9xh" podUID="8031d6c5-d59f-4cb4-803d-ea905d3adb6a" May 15 17:59:31.794475 env[1156]: time="2025-05-15T17:59:31.794415152Z" level=error msg="Failed to destroy network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.796755 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948-shm.mount: Deactivated successfully. May 15 17:59:31.798214 env[1156]: time="2025-05-15T17:59:31.798155732Z" level=error msg="encountered an error cleaning up failed sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.798364 env[1156]: time="2025-05-15T17:59:31.798317088Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pb597,Uid:553cc4bb-81bc-4c56-9d31-50bba5210009,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.798784 kubelet[2041]: E0515 17:59:31.798617 2041 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.798784 kubelet[2041]: E0515 17:59:31.798673 2041 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-pb597" May 15 17:59:31.798784 kubelet[2041]: E0515 17:59:31.798694 2041 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-pb597" May 15 17:59:31.799055 kubelet[2041]: E0515 17:59:31.799012 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-pb597_kube-system(553cc4bb-81bc-4c56-9d31-50bba5210009)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-pb597_kube-system(553cc4bb-81bc-4c56-9d31-50bba5210009)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pb597" podUID="553cc4bb-81bc-4c56-9d31-50bba5210009" May 15 17:59:31.803712 env[1156]: time="2025-05-15T17:59:31.803656691Z" level=error msg="Failed to destroy network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.805972 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6-shm.mount: Deactivated successfully. May 15 17:59:31.807404 env[1156]: time="2025-05-15T17:59:31.807356371Z" level=error msg="encountered an error cleaning up failed sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.807461 env[1156]: time="2025-05-15T17:59:31.807418032Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c9d79cc5c-vzr74,Uid:2d177649-dd03-410c-bb37-8159f7697b6b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.807642 kubelet[2041]: E0515 17:59:31.807591 2041 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:31.807763 kubelet[2041]: E0515 17:59:31.807718 2041 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c9d79cc5c-vzr74" May 15 17:59:31.807827 kubelet[2041]: E0515 17:59:31.807771 2041 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c9d79cc5c-vzr74" May 15 17:59:31.807866 kubelet[2041]: E0515 17:59:31.807820 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7c9d79cc5c-vzr74_calico-system(2d177649-dd03-410c-bb37-8159f7697b6b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7c9d79cc5c-vzr74_calico-system(2d177649-dd03-410c-bb37-8159f7697b6b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c9d79cc5c-vzr74" podUID="2d177649-dd03-410c-bb37-8159f7697b6b" May 15 17:59:32.138334 kubelet[2041]: I0515 17:59:32.138245 2041 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:32.142360 env[1156]: time="2025-05-15T17:59:32.141713321Z" level=info msg="StopPodSandbox for \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\"" May 15 17:59:32.149677 kubelet[2041]: I0515 17:59:32.149614 2041 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:32.153864 env[1156]: time="2025-05-15T17:59:32.153672874Z" level=info msg="StopPodSandbox for \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\"" May 15 17:59:32.157444 kubelet[2041]: I0515 17:59:32.157397 2041 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:32.158627 env[1156]: time="2025-05-15T17:59:32.158533390Z" level=info msg="StopPodSandbox for \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\"" May 15 17:59:32.161435 kubelet[2041]: I0515 17:59:32.161351 2041 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 17:59:32.162573 env[1156]: time="2025-05-15T17:59:32.162489374Z" level=info msg="StopPodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\"" May 15 17:59:32.197197 env[1156]: time="2025-05-15T17:59:32.197037950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 17:59:32.200098 kubelet[2041]: I0515 17:59:32.200043 2041 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:32.204024 env[1156]: time="2025-05-15T17:59:32.203931716Z" level=info msg="StopPodSandbox for \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\"" May 15 17:59:32.211815 kubelet[2041]: I0515 17:59:32.209209 2041 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:32.215504 env[1156]: time="2025-05-15T17:59:32.215455336Z" level=info msg="StopPodSandbox for \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\"" May 15 17:59:32.292893 env[1156]: time="2025-05-15T17:59:32.292820463Z" level=error msg="StopPodSandbox for \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\" failed" error="failed to destroy network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:32.293137 kubelet[2041]: E0515 17:59:32.293084 2041 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:32.293201 kubelet[2041]: E0515 17:59:32.293156 2041 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d"} May 15 17:59:32.293263 kubelet[2041]: E0515 17:59:32.293226 2041 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8031d6c5-d59f-4cb4-803d-ea905d3adb6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:59:32.293351 kubelet[2041]: E0515 17:59:32.293274 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8031d6c5-d59f-4cb4-803d-ea905d3adb6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-667fcfb984-rh9xh" podUID="8031d6c5-d59f-4cb4-803d-ea905d3adb6a" May 15 17:59:32.300843 env[1156]: time="2025-05-15T17:59:32.300709688Z" level=error msg="StopPodSandbox for \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\" failed" error="failed to destroy network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:32.301423 kubelet[2041]: E0515 17:59:32.301233 2041 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:32.301423 kubelet[2041]: E0515 17:59:32.301301 2041 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0"} May 15 17:59:32.301423 kubelet[2041]: E0515 17:59:32.301342 2041 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f6812bd3-d952-466a-8323-4afab6f4de1a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:59:32.301423 kubelet[2041]: E0515 17:59:32.301392 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f6812bd3-d952-466a-8323-4afab6f4de1a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2cnjs" podUID="f6812bd3-d952-466a-8323-4afab6f4de1a" May 15 17:59:32.305263 env[1156]: time="2025-05-15T17:59:32.305204407Z" level=error msg="StopPodSandbox for \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\" failed" error="failed to destroy network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:32.305618 kubelet[2041]: E0515 17:59:32.305575 2041 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:32.305720 kubelet[2041]: E0515 17:59:32.305629 2041 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948"} May 15 17:59:32.305720 kubelet[2041]: E0515 17:59:32.305666 2041 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"553cc4bb-81bc-4c56-9d31-50bba5210009\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:59:32.305851 kubelet[2041]: E0515 17:59:32.305727 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"553cc4bb-81bc-4c56-9d31-50bba5210009\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pb597" podUID="553cc4bb-81bc-4c56-9d31-50bba5210009" May 15 17:59:32.323925 env[1156]: time="2025-05-15T17:59:32.323862774Z" level=error msg="StopPodSandbox for \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\" failed" error="failed to destroy network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:32.324419 kubelet[2041]: E0515 17:59:32.324223 2041 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:32.324419 kubelet[2041]: E0515 17:59:32.324301 2041 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6"} May 15 17:59:32.324419 kubelet[2041]: E0515 17:59:32.324341 2041 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2d177649-dd03-410c-bb37-8159f7697b6b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:59:32.324419 kubelet[2041]: E0515 17:59:32.324389 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2d177649-dd03-410c-bb37-8159f7697b6b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c9d79cc5c-vzr74" podUID="2d177649-dd03-410c-bb37-8159f7697b6b" May 15 17:59:32.332869 env[1156]: time="2025-05-15T17:59:32.332818537Z" level=error msg="StopPodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\" failed" error="failed to destroy network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:32.333226 kubelet[2041]: E0515 17:59:32.333175 2041 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 17:59:32.333301 kubelet[2041]: E0515 17:59:32.333240 2041 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956"} May 15 17:59:32.333301 kubelet[2041]: E0515 17:59:32.333275 2041 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bbc51e4d-e705-4cb0-b394-204802a51d29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:59:32.333396 kubelet[2041]: E0515 17:59:32.333301 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bbc51e4d-e705-4cb0-b394-204802a51d29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-667fcfb984-4gvrr" podUID="bbc51e4d-e705-4cb0-b394-204802a51d29" May 15 17:59:32.339250 env[1156]: time="2025-05-15T17:59:32.339172817Z" level=error msg="StopPodSandbox for \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\" failed" error="failed to destroy network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:32.339476 kubelet[2041]: E0515 17:59:32.339438 2041 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:32.339539 kubelet[2041]: E0515 17:59:32.339488 2041 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2"} May 15 17:59:32.339539 kubelet[2041]: E0515 17:59:32.339525 2041 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2d806229-6a1c-421d-88bd-29bba40b9da0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:59:32.339626 kubelet[2041]: E0515 17:59:32.339552 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2d806229-6a1c-421d-88bd-29bba40b9da0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-zl6zm" podUID="2d806229-6a1c-421d-88bd-29bba40b9da0" May 15 17:59:43.949952 env[1156]: time="2025-05-15T17:59:43.947869522Z" level=info msg="StopPodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\"" May 15 17:59:44.053902 env[1156]: time="2025-05-15T17:59:44.053808153Z" level=error msg="StopPodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\" failed" error="failed to destroy network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:59:44.054490 kubelet[2041]: E0515 17:59:44.054378 2041 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 17:59:44.055073 kubelet[2041]: E0515 17:59:44.054517 2041 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956"} May 15 17:59:44.055073 kubelet[2041]: E0515 17:59:44.054586 2041 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bbc51e4d-e705-4cb0-b394-204802a51d29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:59:44.055073 kubelet[2041]: E0515 17:59:44.054644 2041 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bbc51e4d-e705-4cb0-b394-204802a51d29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-667fcfb984-4gvrr" podUID="bbc51e4d-e705-4cb0-b394-204802a51d29" May 15 17:59:44.183334 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3174414792.mount: Deactivated successfully. May 15 17:59:44.256802 env[1156]: time="2025-05-15T17:59:44.256676648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:44.259841 env[1156]: time="2025-05-15T17:59:44.259801459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:44.263076 env[1156]: time="2025-05-15T17:59:44.263045213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:44.266099 env[1156]: time="2025-05-15T17:59:44.266011396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:44.266995 env[1156]: time="2025-05-15T17:59:44.266933635Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 17:59:44.292198 env[1156]: time="2025-05-15T17:59:44.292130814Z" level=info msg="CreateContainer within sandbox \"5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 17:59:44.314852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4244991613.mount: Deactivated successfully. May 15 17:59:44.330582 env[1156]: time="2025-05-15T17:59:44.330534532Z" level=info msg="CreateContainer within sandbox \"5f463a9d8169dc99dc85767a64d5f8671b44d066fd679fde09a763cc6b55f22f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72\"" May 15 17:59:44.332997 env[1156]: time="2025-05-15T17:59:44.332956460Z" level=info msg="StartContainer for \"e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72\"" May 15 17:59:44.363143 systemd[1]: Started cri-containerd-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72.scope. May 15 17:59:44.390000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.392909 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 17:59:44.393068 kernel: audit: type=1400 audit(1747331984.390:1011): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.390000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fdc2620f118 items=0 ppid=2505 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:44.404746 kernel: audit: type=1300 audit(1747331984.390:1011): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fdc2620f118 items=0 ppid=2505 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:44.404816 kernel: audit: type=1327 audit(1747331984.390:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535396239316461663162666364623061653462306538653030383665 May 15 17:59:44.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535396239316461663162666364623061653462306538653030383665 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.415670 kernel: audit: type=1400 audit(1747331984.391:1012): avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.415755 kernel: audit: type=1400 audit(1747331984.391:1012): avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.424958 kernel: audit: type=1400 audit(1747331984.391:1012): avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.425017 kernel: audit: type=1400 audit(1747331984.391:1012): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.434880 kernel: audit: type=1400 audit(1747331984.391:1012): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.434972 kernel: audit: type=1400 audit(1747331984.391:1012): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.446868 kernel: audit: type=1400 audit(1747331984.391:1012): avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.391000 audit: BPF prog-id=139 op=LOAD May 15 17:59:44.391000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00038bc58 items=0 ppid=2505 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:44.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535396239316461663162666364623061653462306538653030383665 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.404000 audit: BPF prog-id=140 op=LOAD May 15 17:59:44.404000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00038bca8 items=0 ppid=2505 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:44.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535396239316461663162666364623061653462306538653030383665 May 15 17:59:44.410000 audit: BPF prog-id=140 op=UNLOAD May 15 17:59:44.410000 audit: BPF prog-id=139 op=UNLOAD May 15 17:59:44.410000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:44.410000 audit: BPF prog-id=141 op=LOAD May 15 17:59:44.410000 audit[3128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00038bd38 items=0 ppid=2505 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:44.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535396239316461663162666364623061653462306538653030383665 May 15 17:59:44.457366 env[1156]: time="2025-05-15T17:59:44.457322863Z" level=info msg="StartContainer for \"e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72\" returns successfully" May 15 17:59:44.543780 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 17:59:44.543910 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 17:59:44.941236 env[1156]: time="2025-05-15T17:59:44.941191147Z" level=info msg="StopPodSandbox for \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\"" May 15 17:59:44.941642 env[1156]: time="2025-05-15T17:59:44.941614779Z" level=info msg="StopPodSandbox for \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\"" May 15 17:59:44.941965 env[1156]: time="2025-05-15T17:59:44.941938507Z" level=info msg="StopPodSandbox for \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\"" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.061 [INFO][3223] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.062 [INFO][3223] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" iface="eth0" netns="/var/run/netns/cni-9797d453-7457-08fa-8419-d3217e359112" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.062 [INFO][3223] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" iface="eth0" netns="/var/run/netns/cni-9797d453-7457-08fa-8419-d3217e359112" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.062 [INFO][3223] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" iface="eth0" netns="/var/run/netns/cni-9797d453-7457-08fa-8419-d3217e359112" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.062 [INFO][3223] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.062 [INFO][3223] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.112 [INFO][3252] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.112 [INFO][3252] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.112 [INFO][3252] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.121 [WARNING][3252] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.121 [INFO][3252] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.123 [INFO][3252] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:45.141925 env[1156]: 2025-05-15 17:59:45.136 [INFO][3223] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:45.143560 env[1156]: time="2025-05-15T17:59:45.143503011Z" level=info msg="TearDown network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\" successfully" May 15 17:59:45.143702 env[1156]: time="2025-05-15T17:59:45.143678372Z" level=info msg="StopPodSandbox for \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\" returns successfully" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.036 [INFO][3224] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.036 [INFO][3224] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" iface="eth0" netns="/var/run/netns/cni-54551984-507e-c82e-200f-cf3e46854d50" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.036 [INFO][3224] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" iface="eth0" netns="/var/run/netns/cni-54551984-507e-c82e-200f-cf3e46854d50" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.037 [INFO][3224] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" iface="eth0" netns="/var/run/netns/cni-54551984-507e-c82e-200f-cf3e46854d50" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.037 [INFO][3224] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.037 [INFO][3224] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.128 [INFO][3247] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.128 [INFO][3247] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.129 [INFO][3247] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.137 [WARNING][3247] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.137 [INFO][3247] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.139 [INFO][3247] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:45.144190 env[1156]: 2025-05-15 17:59:45.143 [INFO][3224] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:45.144957 env[1156]: time="2025-05-15T17:59:45.144924707Z" level=info msg="TearDown network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\" successfully" May 15 17:59:45.145080 env[1156]: time="2025-05-15T17:59:45.145058277Z" level=info msg="StopPodSandbox for \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\" returns successfully" May 15 17:59:45.146651 env[1156]: time="2025-05-15T17:59:45.146614764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2cnjs,Uid:f6812bd3-d952-466a-8323-4afab6f4de1a,Namespace:calico-system,Attempt:1,}" May 15 17:59:45.149221 env[1156]: time="2025-05-15T17:59:45.148489078Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pb597,Uid:553cc4bb-81bc-4c56-9d31-50bba5210009,Namespace:kube-system,Attempt:1,}" May 15 17:59:45.185550 systemd[1]: run-netns-cni\x2d54551984\x2d507e\x2dc82e\x2d200f\x2dcf3e46854d50.mount: Deactivated successfully. May 15 17:59:45.185665 systemd[1]: run-netns-cni\x2d9797d453\x2d7457\x2d08fa\x2d8419\x2dd3217e359112.mount: Deactivated successfully. May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.087 [INFO][3237] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.089 [INFO][3237] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" iface="eth0" netns="/var/run/netns/cni-e3f58d6c-0d55-0b45-6db7-98d32ad6e943" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.089 [INFO][3237] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" iface="eth0" netns="/var/run/netns/cni-e3f58d6c-0d55-0b45-6db7-98d32ad6e943" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.090 [INFO][3237] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" iface="eth0" netns="/var/run/netns/cni-e3f58d6c-0d55-0b45-6db7-98d32ad6e943" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.090 [INFO][3237] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.090 [INFO][3237] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.195 [INFO][3258] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.195 [INFO][3258] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.195 [INFO][3258] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.203 [WARNING][3258] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.203 [INFO][3258] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.205 [INFO][3258] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:45.213235 env[1156]: 2025-05-15 17:59:45.206 [INFO][3237] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:45.213235 env[1156]: time="2025-05-15T17:59:45.210999413Z" level=info msg="TearDown network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\" successfully" May 15 17:59:45.213235 env[1156]: time="2025-05-15T17:59:45.211044260Z" level=info msg="StopPodSandbox for \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\" returns successfully" May 15 17:59:45.210882 systemd[1]: run-netns-cni\x2de3f58d6c\x2d0d55\x2d0b45\x2d6db7\x2d98d32ad6e943.mount: Deactivated successfully. May 15 17:59:45.214976 env[1156]: time="2025-05-15T17:59:45.214443009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-667fcfb984-rh9xh,Uid:8031d6c5-d59f-4cb4-803d-ea905d3adb6a,Namespace:calico-apiserver,Attempt:1,}" May 15 17:59:45.426407 systemd-networkd[980]: cali0ca77a2cda9: Link UP May 15 17:59:45.434134 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 17:59:45.434274 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0ca77a2cda9: link becomes ready May 15 17:59:45.433318 systemd-networkd[980]: cali0ca77a2cda9: Gained carrier May 15 17:59:45.450674 kubelet[2041]: I0515 17:59:45.448066 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-cqzdd" podStartSLOduration=1.804537629 podStartE2EDuration="32.447963013s" podCreationTimestamp="2025-05-15 17:59:13 +0000 UTC" firstStartedPulling="2025-05-15 17:59:13.626963364 +0000 UTC m=+21.841501796" lastFinishedPulling="2025-05-15 17:59:44.270388657 +0000 UTC m=+52.484927180" observedRunningTime="2025-05-15 17:59:45.319429372 +0000 UTC m=+53.533967804" watchObservedRunningTime="2025-05-15 17:59:45.447963013 +0000 UTC m=+53.662501445" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.239 [INFO][3266] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.264 [INFO][3266] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0 coredns-7db6d8ff4d- kube-system 553cc4bb-81bc-4c56-9d31-50bba5210009 794 0 2025-05-15 17:59:05 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-100-3e5a09d652.novalocal coredns-7db6d8ff4d-pb597 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0ca77a2cda9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pb597" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.264 [INFO][3266] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pb597" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.329 [INFO][3297] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" HandleID="k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.344 [INFO][3297] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" HandleID="k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003acd90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-100-3e5a09d652.novalocal", "pod":"coredns-7db6d8ff4d-pb597", "timestamp":"2025-05-15 17:59:45.329318062 +0000 UTC"}, Hostname:"ci-3510-3-100-3e5a09d652.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.344 [INFO][3297] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.344 [INFO][3297] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.344 [INFO][3297] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-100-3e5a09d652.novalocal' May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.357 [INFO][3297] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.363 [INFO][3297] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.368 [INFO][3297] ipam/ipam.go 489: Trying affinity for 192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.370 [INFO][3297] ipam/ipam.go 155: Attempting to load block cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.372 [INFO][3297] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.372 [INFO][3297] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.128/26 handle="k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.375 [INFO][3297] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.383 [INFO][3297] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.11.128/26 handle="k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.390 [INFO][3297] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.11.129/26] block=192.168.11.128/26 handle="k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.390 [INFO][3297] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.129/26] handle="k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.390 [INFO][3297] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:45.465930 env[1156]: 2025-05-15 17:59:45.390 [INFO][3297] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.11.129/26] IPv6=[] ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" HandleID="k8s-pod-network.29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.467236 env[1156]: 2025-05-15 17:59:45.393 [INFO][3266] cni-plugin/k8s.go 386: Populated endpoint ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pb597" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"553cc4bb-81bc-4c56-9d31-50bba5210009", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"", Pod:"coredns-7db6d8ff4d-pb597", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0ca77a2cda9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:45.467236 env[1156]: 2025-05-15 17:59:45.393 [INFO][3266] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.11.129/32] ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pb597" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.467236 env[1156]: 2025-05-15 17:59:45.393 [INFO][3266] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0ca77a2cda9 ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pb597" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.467236 env[1156]: 2025-05-15 17:59:45.434 [INFO][3266] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pb597" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.467236 env[1156]: 2025-05-15 17:59:45.435 [INFO][3266] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pb597" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"553cc4bb-81bc-4c56-9d31-50bba5210009", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b", Pod:"coredns-7db6d8ff4d-pb597", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0ca77a2cda9", MAC:"7e:05:36:be:f9:90", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:45.467236 env[1156]: 2025-05-15 17:59:45.447 [INFO][3266] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pb597" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:45.478216 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali77ad82bb16e: link becomes ready May 15 17:59:45.478568 systemd-networkd[980]: cali77ad82bb16e: Link UP May 15 17:59:45.479447 systemd-networkd[980]: cali77ad82bb16e: Gained carrier May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.273 [INFO][3272] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.287 [INFO][3272] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0 csi-node-driver- calico-system f6812bd3-d952-466a-8323-4afab6f4de1a 795 0 2025-05-15 17:59:13 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-100-3e5a09d652.novalocal csi-node-driver-2cnjs eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali77ad82bb16e [] []}} ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Namespace="calico-system" Pod="csi-node-driver-2cnjs" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.288 [INFO][3272] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Namespace="calico-system" Pod="csi-node-driver-2cnjs" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.373 [INFO][3308] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" HandleID="k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.396 [INFO][3308] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" HandleID="k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b3c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-100-3e5a09d652.novalocal", "pod":"csi-node-driver-2cnjs", "timestamp":"2025-05-15 17:59:45.37331143 +0000 UTC"}, Hostname:"ci-3510-3-100-3e5a09d652.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.396 [INFO][3308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.396 [INFO][3308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.396 [INFO][3308] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-100-3e5a09d652.novalocal' May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.398 [INFO][3308] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.404 [INFO][3308] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.414 [INFO][3308] ipam/ipam.go 489: Trying affinity for 192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.416 [INFO][3308] ipam/ipam.go 155: Attempting to load block cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.421 [INFO][3308] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.421 [INFO][3308] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.128/26 handle="k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.423 [INFO][3308] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.442 [INFO][3308] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.11.128/26 handle="k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.452 [INFO][3308] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.11.130/26] block=192.168.11.128/26 handle="k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.452 [INFO][3308] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.130/26] handle="k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.452 [INFO][3308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:45.487500 env[1156]: 2025-05-15 17:59:45.452 [INFO][3308] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.11.130/26] IPv6=[] ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" HandleID="k8s-pod-network.fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.488450 env[1156]: 2025-05-15 17:59:45.456 [INFO][3272] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Namespace="calico-system" Pod="csi-node-driver-2cnjs" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f6812bd3-d952-466a-8323-4afab6f4de1a", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"", Pod:"csi-node-driver-2cnjs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.11.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali77ad82bb16e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:45.488450 env[1156]: 2025-05-15 17:59:45.456 [INFO][3272] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.11.130/32] ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Namespace="calico-system" Pod="csi-node-driver-2cnjs" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.488450 env[1156]: 2025-05-15 17:59:45.456 [INFO][3272] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali77ad82bb16e ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Namespace="calico-system" Pod="csi-node-driver-2cnjs" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.488450 env[1156]: 2025-05-15 17:59:45.471 [INFO][3272] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Namespace="calico-system" Pod="csi-node-driver-2cnjs" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.488450 env[1156]: 2025-05-15 17:59:45.471 [INFO][3272] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Namespace="calico-system" Pod="csi-node-driver-2cnjs" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f6812bd3-d952-466a-8323-4afab6f4de1a", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e", Pod:"csi-node-driver-2cnjs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.11.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali77ad82bb16e", MAC:"b2:be:34:73:d9:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:45.488450 env[1156]: 2025-05-15 17:59:45.486 [INFO][3272] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e" Namespace="calico-system" Pod="csi-node-driver-2cnjs" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:45.518948 env[1156]: time="2025-05-15T17:59:45.518610274Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:45.518948 env[1156]: time="2025-05-15T17:59:45.518689417Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:45.518948 env[1156]: time="2025-05-15T17:59:45.518705028Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:45.519953 env[1156]: time="2025-05-15T17:59:45.518992485Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e pid=3362 runtime=io.containerd.runc.v2 May 15 17:59:45.534713 env[1156]: time="2025-05-15T17:59:45.534455863Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:45.534713 env[1156]: time="2025-05-15T17:59:45.534659749Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:45.534713 env[1156]: time="2025-05-15T17:59:45.534676611Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:45.537126 env[1156]: time="2025-05-15T17:59:45.537045434Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b pid=3363 runtime=io.containerd.runc.v2 May 15 17:59:45.544043 systemd[1]: Started cri-containerd-fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e.scope. May 15 17:59:45.561793 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7156b06aab2: link becomes ready May 15 17:59:45.563179 systemd-networkd[980]: cali7156b06aab2: Link UP May 15 17:59:45.564126 systemd-networkd[980]: cali7156b06aab2: Gained carrier May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.348 [INFO][3291] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.369 [INFO][3291] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0 calico-apiserver-667fcfb984- calico-apiserver 8031d6c5-d59f-4cb4-803d-ea905d3adb6a 797 0 2025-05-15 17:59:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:667fcfb984 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-100-3e5a09d652.novalocal calico-apiserver-667fcfb984-rh9xh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7156b06aab2 [] []}} ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-rh9xh" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.369 [INFO][3291] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-rh9xh" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.499 [INFO][3319] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" HandleID="k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.510 [INFO][3319] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" HandleID="k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000392720), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-100-3e5a09d652.novalocal", "pod":"calico-apiserver-667fcfb984-rh9xh", "timestamp":"2025-05-15 17:59:45.499307383 +0000 UTC"}, Hostname:"ci-3510-3-100-3e5a09d652.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.510 [INFO][3319] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.511 [INFO][3319] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.511 [INFO][3319] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-100-3e5a09d652.novalocal' May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.512 [INFO][3319] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.517 [INFO][3319] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.531 [INFO][3319] ipam/ipam.go 489: Trying affinity for 192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.533 [INFO][3319] ipam/ipam.go 155: Attempting to load block cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.536 [INFO][3319] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.536 [INFO][3319] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.128/26 handle="k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.538 [INFO][3319] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.547 [INFO][3319] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.11.128/26 handle="k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.556 [INFO][3319] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.11.131/26] block=192.168.11.128/26 handle="k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.556 [INFO][3319] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.131/26] handle="k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.556 [INFO][3319] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:45.589150 env[1156]: 2025-05-15 17:59:45.556 [INFO][3319] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.11.131/26] IPv6=[] ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" HandleID="k8s-pod-network.fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.590127 env[1156]: 2025-05-15 17:59:45.558 [INFO][3291] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-rh9xh" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0", GenerateName:"calico-apiserver-667fcfb984-", Namespace:"calico-apiserver", SelfLink:"", UID:"8031d6c5-d59f-4cb4-803d-ea905d3adb6a", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"667fcfb984", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"", Pod:"calico-apiserver-667fcfb984-rh9xh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7156b06aab2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:45.590127 env[1156]: 2025-05-15 17:59:45.558 [INFO][3291] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.11.131/32] ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-rh9xh" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.590127 env[1156]: 2025-05-15 17:59:45.558 [INFO][3291] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7156b06aab2 ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-rh9xh" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.590127 env[1156]: 2025-05-15 17:59:45.562 [INFO][3291] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-rh9xh" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.590127 env[1156]: 2025-05-15 17:59:45.570 [INFO][3291] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-rh9xh" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0", GenerateName:"calico-apiserver-667fcfb984-", Namespace:"calico-apiserver", SelfLink:"", UID:"8031d6c5-d59f-4cb4-803d-ea905d3adb6a", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"667fcfb984", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e", Pod:"calico-apiserver-667fcfb984-rh9xh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7156b06aab2", MAC:"a6:58:df:11:91:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:45.590127 env[1156]: 2025-05-15 17:59:45.586 [INFO][3291] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-rh9xh" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:45.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.596000 audit: BPF prog-id=142 op=LOAD May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3362 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373566396535386266633434616232366535613966353232323833 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3362 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373566396535386266633434616232366535613966353232323833 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit: BPF prog-id=143 op=LOAD May 15 17:59:45.597000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d6aa0 items=0 ppid=3362 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373566396535386266633434616232366535613966353232323833 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit: BPF prog-id=144 op=LOAD May 15 17:59:45.597000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d6ae8 items=0 ppid=3362 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373566396535386266633434616232366535613966353232323833 May 15 17:59:45.597000 audit: BPF prog-id=144 op=UNLOAD May 15 17:59:45.597000 audit: BPF prog-id=143 op=UNLOAD May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.597000 audit: BPF prog-id=145 op=LOAD May 15 17:59:45.597000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d6ef8 items=0 ppid=3362 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373566396535386266633434616232366535613966353232323833 May 15 17:59:45.627548 systemd[1]: Started cri-containerd-29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b.scope. May 15 17:59:45.651710 env[1156]: time="2025-05-15T17:59:45.651639331Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:45.651983 env[1156]: time="2025-05-15T17:59:45.651955354Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:45.652100 env[1156]: time="2025-05-15T17:59:45.652076258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:45.652312 env[1156]: time="2025-05-15T17:59:45.652277258Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e pid=3443 runtime=io.containerd.runc.v2 May 15 17:59:45.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.656000 audit: BPF prog-id=146 op=LOAD May 15 17:59:45.659000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.659000 audit[3393]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3363 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239613830343036323534616136333365623436626466613263646230 May 15 17:59:45.659000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.659000 audit[3393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3363 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239613830343036323534616136333365623436626466613263646230 May 15 17:59:45.661127 env[1156]: time="2025-05-15T17:59:45.661083040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2cnjs,Uid:f6812bd3-d952-466a-8323-4afab6f4de1a,Namespace:calico-system,Attempt:1,} returns sandbox id \"fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e\"" May 15 17:59:45.660000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.660000 audit: BPF prog-id=147 op=LOAD May 15 17:59:45.660000 audit[3393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000393320 items=0 ppid=3363 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239613830343036323534616136333365623436626466613263646230 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.661000 audit: BPF prog-id=148 op=LOAD May 15 17:59:45.661000 audit[3393]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000393368 items=0 ppid=3363 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239613830343036323534616136333365623436626466613263646230 May 15 17:59:45.663000 audit: BPF prog-id=148 op=UNLOAD May 15 17:59:45.663000 audit: BPF prog-id=147 op=UNLOAD May 15 17:59:45.663000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.663000 audit: BPF prog-id=149 op=LOAD May 15 17:59:45.663000 audit[3393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000393778 items=0 ppid=3363 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239613830343036323534616136333365623436626466613263646230 May 15 17:59:45.668230 env[1156]: time="2025-05-15T17:59:45.668192623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 17:59:45.696910 systemd[1]: Started cri-containerd-fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e.scope. May 15 17:59:45.720503 env[1156]: time="2025-05-15T17:59:45.720378833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pb597,Uid:553cc4bb-81bc-4c56-9d31-50bba5210009,Namespace:kube-system,Attempt:1,} returns sandbox id \"29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b\"" May 15 17:59:45.733207 env[1156]: time="2025-05-15T17:59:45.733160422Z" level=info msg="CreateContainer within sandbox \"29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 17:59:45.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.741000 audit: BPF prog-id=150 op=LOAD May 15 17:59:45.742000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333664396133336364623963313866356564353663386664613634 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333664396133336364623963313866356564353663386664613634 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.742000 audit: BPF prog-id=151 op=LOAD May 15 17:59:45.742000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032dd10 items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333664396133336364623963313866356564353663386664613634 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit: BPF prog-id=152 op=LOAD May 15 17:59:45.743000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032dd58 items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333664396133336364623963313866356564353663386664613634 May 15 17:59:45.743000 audit: BPF prog-id=152 op=UNLOAD May 15 17:59:45.743000 audit: BPF prog-id=151 op=UNLOAD May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.743000 audit: BPF prog-id=153 op=LOAD May 15 17:59:45.743000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0168 items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333664396133336364623963313866356564353663386664613634 May 15 17:59:45.766424 env[1156]: time="2025-05-15T17:59:45.766371868Z" level=info msg="CreateContainer within sandbox \"29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f37e178e9bf96e86894ee84a670fc14a75bf9a662f631b2dd0ab2eda81bf8b58\"" May 15 17:59:45.768699 env[1156]: time="2025-05-15T17:59:45.768648672Z" level=info msg="StartContainer for \"f37e178e9bf96e86894ee84a670fc14a75bf9a662f631b2dd0ab2eda81bf8b58\"" May 15 17:59:45.809687 env[1156]: time="2025-05-15T17:59:45.809620372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-667fcfb984-rh9xh,Uid:8031d6c5-d59f-4cb4-803d-ea905d3adb6a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e\"" May 15 17:59:45.820341 systemd[1]: Started cri-containerd-f37e178e9bf96e86894ee84a670fc14a75bf9a662f631b2dd0ab2eda81bf8b58.scope. May 15 17:59:45.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.841000 audit: BPF prog-id=154 op=LOAD May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3363 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376531373865396266393665383638393465653834613637306663 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3363 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376531373865396266393665383638393465653834613637306663 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit: BPF prog-id=155 op=LOAD May 15 17:59:45.842000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000187eb0 items=0 ppid=3363 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376531373865396266393665383638393465653834613637306663 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.842000 audit: BPF prog-id=156 op=LOAD May 15 17:59:45.842000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000187ef8 items=0 ppid=3363 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376531373865396266393665383638393465653834613637306663 May 15 17:59:45.843000 audit: BPF prog-id=156 op=UNLOAD May 15 17:59:45.843000 audit: BPF prog-id=155 op=UNLOAD May 15 17:59:45.843000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:45.843000 audit: BPF prog-id=157 op=LOAD May 15 17:59:45.843000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0308 items=0 ppid=3363 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376531373865396266393665383638393465653834613637306663 May 15 17:59:45.944060 env[1156]: time="2025-05-15T17:59:45.944009125Z" level=info msg="StopPodSandbox for \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\"" May 15 17:59:45.984000 audit[3565]: AVC avc: denied { write } for pid=3565 comm="tee" name="fd" dev="proc" ino=26618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:59:45.984000 audit[3565]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd61e429f4 a2=241 a3=1b6 items=1 ppid=3542 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.984000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 17:59:45.984000 audit: PATH item=0 name="/dev/fd/63" inode=26603 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:59:45.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:59:45.998000 audit[3573]: AVC avc: denied { write } for pid=3573 comm="tee" name="fd" dev="proc" ino=27650 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:59:45.998000 audit[3573]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde3cfb9e4 a2=241 a3=1b6 items=1 ppid=3546 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:45.998000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 17:59:45.998000 audit: PATH item=0 name="/dev/fd/63" inode=26612 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:59:45.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:59:46.004000 audit[3576]: AVC avc: denied { write } for pid=3576 comm="tee" name="fd" dev="proc" ino=27654 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:59:46.004000 audit[3576]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc13c5e9f6 a2=241 a3=1b6 items=1 ppid=3543 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.004000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 17:59:46.004000 audit: PATH item=0 name="/dev/fd/63" inode=26615 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:59:46.004000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:59:46.005000 audit[3569]: AVC avc: denied { write } for pid=3569 comm="tee" name="fd" dev="proc" ino=27658 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:59:46.005000 audit[3569]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc749a19f4 a2=241 a3=1b6 items=1 ppid=3541 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.005000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 17:59:46.005000 audit: PATH item=0 name="/dev/fd/63" inode=27402 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:59:46.005000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:59:46.008000 audit[3584]: AVC avc: denied { write } for pid=3584 comm="tee" name="fd" dev="proc" ino=27662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:59:46.008000 audit[3584]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6d5f39f5 a2=241 a3=1b6 items=1 ppid=3552 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.008000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 17:59:46.008000 audit: PATH item=0 name="/dev/fd/63" inode=27649 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:59:46.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:59:46.009000 audit[3578]: AVC avc: denied { write } for pid=3578 comm="tee" name="fd" dev="proc" ino=27420 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:59:46.009000 audit[3578]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbcefb9f4 a2=241 a3=1b6 items=1 ppid=3525 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.009000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 17:59:46.009000 audit: PATH item=0 name="/dev/fd/63" inode=27406 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:59:46.009000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:59:46.009000 audit[3572]: AVC avc: denied { write } for pid=3572 comm="tee" name="fd" dev="proc" ino=27666 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:59:46.009000 audit[3572]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa68f59e5 a2=241 a3=1b6 items=1 ppid=3545 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.009000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 17:59:46.009000 audit: PATH item=0 name="/dev/fd/63" inode=27403 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:59:46.009000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:59:46.215727 env[1156]: time="2025-05-15T17:59:46.215676734Z" level=info msg="StartContainer for \"f37e178e9bf96e86894ee84a670fc14a75bf9a662f631b2dd0ab2eda81bf8b58\" returns successfully" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.156 [INFO][3540] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.156 [INFO][3540] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" iface="eth0" netns="/var/run/netns/cni-65ddba3e-a589-d0cf-ee66-556a7b2622c9" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.156 [INFO][3540] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" iface="eth0" netns="/var/run/netns/cni-65ddba3e-a589-d0cf-ee66-556a7b2622c9" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.157 [INFO][3540] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" iface="eth0" netns="/var/run/netns/cni-65ddba3e-a589-d0cf-ee66-556a7b2622c9" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.157 [INFO][3540] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.157 [INFO][3540] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.235 [INFO][3589] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.236 [INFO][3589] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.236 [INFO][3589] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.244 [WARNING][3589] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.245 [INFO][3589] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.247 [INFO][3589] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:46.249797 env[1156]: 2025-05-15 17:59:46.248 [INFO][3540] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:46.284502 env[1156]: time="2025-05-15T17:59:46.252864816Z" level=info msg="TearDown network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\" successfully" May 15 17:59:46.284502 env[1156]: time="2025-05-15T17:59:46.252906536Z" level=info msg="StopPodSandbox for \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\" returns successfully" May 15 17:59:46.284502 env[1156]: time="2025-05-15T17:59:46.253543661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c9d79cc5c-vzr74,Uid:2d177649-dd03-410c-bb37-8159f7697b6b,Namespace:calico-system,Attempt:1,}" May 15 17:59:46.252626 systemd[1]: run-netns-cni\x2d65ddba3e\x2da589\x2dd0cf\x2dee66\x2d556a7b2622c9.mount: Deactivated successfully. May 15 17:59:46.356283 kubelet[2041]: I0515 17:59:46.356220 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-pb597" podStartSLOduration=41.356200937 podStartE2EDuration="41.356200937s" podCreationTimestamp="2025-05-15 17:59:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 17:59:46.355350119 +0000 UTC m=+54.569888541" watchObservedRunningTime="2025-05-15 17:59:46.356200937 +0000 UTC m=+54.570739359" May 15 17:59:46.414000 audit[3629]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:46.414000 audit[3629]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffe4e29e20 a2=0 a3=7fffe4e29e0c items=0 ppid=2219 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:46.419000 audit[3629]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:46.419000 audit[3629]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffe4e29e20 a2=0 a3=0 items=0 ppid=2219 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:46.545000 audit[3636]: NETFILTER_CFG table=filter:99 family=2 entries=13 op=nft_register_rule pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:46.545000 audit[3636]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcf9a40d90 a2=0 a3=7ffcf9a40d7c items=0 ppid=2219 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:46.551000 audit[3636]: NETFILTER_CFG table=nat:100 family=2 entries=35 op=nft_register_chain pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:46.551000 audit[3636]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcf9a40d90 a2=0 a3=7ffcf9a40d7c items=0 ppid=2219 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.828000 audit: BPF prog-id=158 op=LOAD May 15 17:59:46.828000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb6799500 a2=98 a3=3 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.828000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:46.829000 audit: BPF prog-id=158 op=UNLOAD May 15 17:59:46.829000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.829000 audit: BPF prog-id=159 op=LOAD May 15 17:59:46.829000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb67992e0 a2=74 a3=540051 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.829000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:46.830000 audit: BPF prog-id=159 op=UNLOAD May 15 17:59:46.830000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:46.830000 audit: BPF prog-id=160 op=LOAD May 15 17:59:46.830000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb6799310 a2=94 a3=2 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:46.830000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:46.831000 audit: BPF prog-id=160 op=UNLOAD May 15 17:59:46.836233 systemd-networkd[980]: cali7156b06aab2: Gained IPv6LL May 15 17:59:46.924807 systemd-networkd[980]: cali5de1fc79fa7: Link UP May 15 17:59:46.930426 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 17:59:46.930521 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5de1fc79fa7: link becomes ready May 15 17:59:46.931364 systemd-networkd[980]: cali5de1fc79fa7: Gained carrier May 15 17:59:46.941953 env[1156]: time="2025-05-15T17:59:46.941531238Z" level=info msg="StopPodSandbox for \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\"" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.818 [INFO][3653] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0 calico-kube-controllers-7c9d79cc5c- calico-system 2d177649-dd03-410c-bb37-8159f7697b6b 815 0 2025-05-15 17:59:13 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7c9d79cc5c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-100-3e5a09d652.novalocal calico-kube-controllers-7c9d79cc5c-vzr74 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5de1fc79fa7 [] []}} ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Namespace="calico-system" Pod="calico-kube-controllers-7c9d79cc5c-vzr74" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.818 [INFO][3653] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Namespace="calico-system" Pod="calico-kube-controllers-7c9d79cc5c-vzr74" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.865 [INFO][3682] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" HandleID="k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.881 [INFO][3682] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" HandleID="k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000315400), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-100-3e5a09d652.novalocal", "pod":"calico-kube-controllers-7c9d79cc5c-vzr74", "timestamp":"2025-05-15 17:59:46.865410445 +0000 UTC"}, Hostname:"ci-3510-3-100-3e5a09d652.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.881 [INFO][3682] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.881 [INFO][3682] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.881 [INFO][3682] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-100-3e5a09d652.novalocal' May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.883 [INFO][3682] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.887 [INFO][3682] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.894 [INFO][3682] ipam/ipam.go 489: Trying affinity for 192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.896 [INFO][3682] ipam/ipam.go 155: Attempting to load block cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.899 [INFO][3682] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.899 [INFO][3682] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.128/26 handle="k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.901 [INFO][3682] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.907 [INFO][3682] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.11.128/26 handle="k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.920 [INFO][3682] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.11.132/26] block=192.168.11.128/26 handle="k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.920 [INFO][3682] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.132/26] handle="k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.920 [INFO][3682] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:46.953527 env[1156]: 2025-05-15 17:59:46.920 [INFO][3682] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.11.132/26] IPv6=[] ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" HandleID="k8s-pod-network.32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.954351 env[1156]: 2025-05-15 17:59:46.922 [INFO][3653] cni-plugin/k8s.go 386: Populated endpoint ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Namespace="calico-system" Pod="calico-kube-controllers-7c9d79cc5c-vzr74" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0", GenerateName:"calico-kube-controllers-7c9d79cc5c-", Namespace:"calico-system", SelfLink:"", UID:"2d177649-dd03-410c-bb37-8159f7697b6b", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c9d79cc5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"", Pod:"calico-kube-controllers-7c9d79cc5c-vzr74", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.11.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5de1fc79fa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:46.954351 env[1156]: 2025-05-15 17:59:46.922 [INFO][3653] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.11.132/32] ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Namespace="calico-system" Pod="calico-kube-controllers-7c9d79cc5c-vzr74" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.954351 env[1156]: 2025-05-15 17:59:46.922 [INFO][3653] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5de1fc79fa7 ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Namespace="calico-system" Pod="calico-kube-controllers-7c9d79cc5c-vzr74" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.954351 env[1156]: 2025-05-15 17:59:46.926 [INFO][3653] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Namespace="calico-system" Pod="calico-kube-controllers-7c9d79cc5c-vzr74" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.954351 env[1156]: 2025-05-15 17:59:46.931 [INFO][3653] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Namespace="calico-system" Pod="calico-kube-controllers-7c9d79cc5c-vzr74" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0", GenerateName:"calico-kube-controllers-7c9d79cc5c-", Namespace:"calico-system", SelfLink:"", UID:"2d177649-dd03-410c-bb37-8159f7697b6b", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c9d79cc5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd", Pod:"calico-kube-controllers-7c9d79cc5c-vzr74", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.11.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5de1fc79fa7", MAC:"9a:2e:c1:f8:0a:7a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:46.954351 env[1156]: 2025-05-15 17:59:46.950 [INFO][3653] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd" Namespace="calico-system" Pod="calico-kube-controllers-7c9d79cc5c-vzr74" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:46.995632 env[1156]: time="2025-05-15T17:59:46.995505963Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:46.995632 env[1156]: time="2025-05-15T17:59:46.995636045Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:46.995911 env[1156]: time="2025-05-15T17:59:46.995668258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:46.996127 env[1156]: time="2025-05-15T17:59:46.996084715Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd pid=3725 runtime=io.containerd.runc.v2 May 15 17:59:47.028294 systemd[1]: Started cri-containerd-32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd.scope. May 15 17:59:47.044968 systemd-networkd[980]: cali0ca77a2cda9: Gained IPv6LL May 15 17:59:47.050000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit: BPF prog-id=161 op=LOAD May 15 17:59:47.050000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb67991d0 a2=40 a3=1 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.050000 audit: BPF prog-id=161 op=UNLOAD May 15 17:59:47.050000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.050000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffb67992a0 a2=50 a3=7fffb6799380 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit: BPF prog-id=162 op=LOAD May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3725 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332653339363738656362386139613032383261383535343466343630 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3725 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332653339363738656362386139613032383261383535343466343630 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit: BPF prog-id=163 op=LOAD May 15 17:59:47.070000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00037c880 items=0 ppid=3725 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332653339363738656362386139613032383261383535343466343630 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit: BPF prog-id=164 op=LOAD May 15 17:59:47.070000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00037c8c8 items=0 ppid=3725 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332653339363738656362386139613032383261383535343466343630 May 15 17:59:47.070000 audit: BPF prog-id=164 op=UNLOAD May 15 17:59:47.070000 audit: BPF prog-id=163 op=UNLOAD May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.070000 audit: BPF prog-id=165 op=LOAD May 15 17:59:47.070000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037ccd8 items=0 ppid=3725 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332653339363738656362386139613032383261383535343466343630 May 15 17:59:47.076000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.076000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb67991e0 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.077000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.077000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb6799210 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.078000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.078000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb6799120 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.078000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.078000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.078000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb6799230 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.078000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.078000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.078000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb6799210 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.078000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.078000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.078000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb6799200 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.078000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.079000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.079000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb6799230 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.079000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.079000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb6799210 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.079000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.079000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb6799230 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.079000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.079000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb6799200 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.079000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.079000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb6799270 a2=28 a3=0 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.079000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.079000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb6799020 a2=50 a3=1 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit: BPF prog-id=166 op=LOAD May 15 17:59:47.080000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb6799020 a2=94 a3=5 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.080000 audit: BPF prog-id=166 op=UNLOAD May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb67990d0 a2=50 a3=1 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffb67991f0 a2=4 a3=38 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.080000 audit[3680]: AVC avc: denied { confidentiality } for pid=3680 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:59:47.080000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb6799240 a2=94 a3=6 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.081000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { confidentiality } for pid=3680 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:59:47.081000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb67989f0 a2=94 a3=83 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.081000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.081000 audit[3680]: AVC avc: denied { confidentiality } for pid=3680 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:59:47.081000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb67989f0 a2=94 a3=83 items=0 ppid=3594 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:59:47.092150 systemd-networkd[980]: cali77ad82bb16e: Gained IPv6LL May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit: BPF prog-id=167 op=LOAD May 15 17:59:47.098000 audit[3758]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0a226370 a2=98 a3=1999999999999999 items=0 ppid=3594 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.098000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 17:59:47.098000 audit: BPF prog-id=167 op=UNLOAD May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit: BPF prog-id=168 op=LOAD May 15 17:59:47.098000 audit[3758]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0a226250 a2=74 a3=ffff items=0 ppid=3594 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.098000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 17:59:47.098000 audit: BPF prog-id=168 op=UNLOAD May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.098000 audit: BPF prog-id=169 op=LOAD May 15 17:59:47.098000 audit[3758]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0a226290 a2=40 a3=7ffe0a226470 items=0 ppid=3594 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.098000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 17:59:47.098000 audit: BPF prog-id=169 op=UNLOAD May 15 17:59:47.147137 env[1156]: time="2025-05-15T17:59:47.147062858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c9d79cc5c-vzr74,Uid:2d177649-dd03-410c-bb37-8159f7697b6b,Namespace:calico-system,Attempt:1,} returns sandbox id \"32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd\"" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.087 [INFO][3710] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.087 [INFO][3710] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" iface="eth0" netns="/var/run/netns/cni-87d35d8c-1970-6d6f-230f-3d30c5c5320b" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.087 [INFO][3710] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" iface="eth0" netns="/var/run/netns/cni-87d35d8c-1970-6d6f-230f-3d30c5c5320b" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.087 [INFO][3710] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" iface="eth0" netns="/var/run/netns/cni-87d35d8c-1970-6d6f-230f-3d30c5c5320b" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.087 [INFO][3710] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.087 [INFO][3710] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.143 [INFO][3752] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.143 [INFO][3752] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.151 [INFO][3752] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.158 [WARNING][3752] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.158 [INFO][3752] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.160 [INFO][3752] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:47.163120 env[1156]: 2025-05-15 17:59:47.161 [INFO][3710] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:47.163857 env[1156]: time="2025-05-15T17:59:47.163807341Z" level=info msg="TearDown network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\" successfully" May 15 17:59:47.163974 env[1156]: time="2025-05-15T17:59:47.163952953Z" level=info msg="StopPodSandbox for \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\" returns successfully" May 15 17:59:47.164905 env[1156]: time="2025-05-15T17:59:47.164880510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zl6zm,Uid:2d806229-6a1c-421d-88bd-29bba40b9da0,Namespace:kube-system,Attempt:1,}" May 15 17:59:47.181185 systemd[1]: run-containerd-runc-k8s.io-32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd-runc.yt9Tph.mount: Deactivated successfully. May 15 17:59:47.181910 systemd[1]: run-netns-cni\x2d87d35d8c\x2d1970\x2d6d6f\x2d230f\x2d3d30c5c5320b.mount: Deactivated successfully. May 15 17:59:47.213147 systemd-networkd[980]: vxlan.calico: Link UP May 15 17:59:47.213155 systemd-networkd[980]: vxlan.calico: Gained carrier May 15 17:59:47.239000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit: BPF prog-id=170 op=LOAD May 15 17:59:47.239000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec91dbfa0 a2=98 a3=100 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.239000 audit: BPF prog-id=170 op=UNLOAD May 15 17:59:47.239000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.239000 audit: BPF prog-id=171 op=LOAD May 15 17:59:47.239000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec91dbdb0 a2=74 a3=540051 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit: BPF prog-id=171 op=UNLOAD May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit: BPF prog-id=172 op=LOAD May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec91dbde0 a2=94 a3=2 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit: BPF prog-id=172 op=UNLOAD May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec91dbcb0 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec91dbce0 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec91dbbf0 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec91dbd00 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec91dbce0 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec91dbcd0 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec91dbd00 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec91dbce0 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec91dbd00 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec91dbcd0 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec91dbd40 a2=28 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.240000 audit: BPF prog-id=173 op=LOAD May 15 17:59:47.240000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec91dbbb0 a2=40 a3=0 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.240000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.241000 audit: BPF prog-id=173 op=UNLOAD May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffec91dbba0 a2=50 a3=2800 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffec91dbba0 a2=50 a3=2800 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit: BPF prog-id=174 op=LOAD May 15 17:59:47.241000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec91db3c0 a2=94 a3=2 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.241000 audit: BPF prog-id=174 op=UNLOAD May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.241000 audit: BPF prog-id=175 op=LOAD May 15 17:59:47.241000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec91db4c0 a2=94 a3=30 items=0 ppid=3594 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.241000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit: BPF prog-id=176 op=LOAD May 15 17:59:47.244000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3fa69160 a2=98 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.244000 audit: BPF prog-id=176 op=UNLOAD May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit: BPF prog-id=177 op=LOAD May 15 17:59:47.244000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe3fa68f40 a2=74 a3=540051 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.244000 audit: BPF prog-id=177 op=UNLOAD May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.244000 audit: BPF prog-id=178 op=LOAD May 15 17:59:47.244000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe3fa68f70 a2=94 a3=2 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.245000 audit: BPF prog-id=178 op=UNLOAD May 15 17:59:47.416103 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali56d388b7648: link becomes ready May 15 17:59:47.415671 systemd-networkd[980]: cali56d388b7648: Link UP May 15 17:59:47.415908 systemd-networkd[980]: cali56d388b7648: Gained carrier May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.301 [INFO][3784] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0 coredns-7db6d8ff4d- kube-system 2d806229-6a1c-421d-88bd-29bba40b9da0 829 0 2025-05-15 17:59:05 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-100-3e5a09d652.novalocal coredns-7db6d8ff4d-zl6zm eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali56d388b7648 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zl6zm" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.301 [INFO][3784] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zl6zm" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.351 [INFO][3816] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" HandleID="k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.361 [INFO][3816] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" HandleID="k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c4380), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-100-3e5a09d652.novalocal", "pod":"coredns-7db6d8ff4d-zl6zm", "timestamp":"2025-05-15 17:59:47.351397653 +0000 UTC"}, Hostname:"ci-3510-3-100-3e5a09d652.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.361 [INFO][3816] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.361 [INFO][3816] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.361 [INFO][3816] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-100-3e5a09d652.novalocal' May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.363 [INFO][3816] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.368 [INFO][3816] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.379 [INFO][3816] ipam/ipam.go 489: Trying affinity for 192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.383 [INFO][3816] ipam/ipam.go 155: Attempting to load block cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.387 [INFO][3816] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.387 [INFO][3816] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.128/26 handle="k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.391 [INFO][3816] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1 May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.400 [INFO][3816] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.11.128/26 handle="k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.410 [INFO][3816] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.11.133/26] block=192.168.11.128/26 handle="k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.410 [INFO][3816] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.133/26] handle="k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.410 [INFO][3816] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:47.440976 env[1156]: 2025-05-15 17:59:47.410 [INFO][3816] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.11.133/26] IPv6=[] ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" HandleID="k8s-pod-network.d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.441991 env[1156]: 2025-05-15 17:59:47.412 [INFO][3784] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zl6zm" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"2d806229-6a1c-421d-88bd-29bba40b9da0", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"", Pod:"coredns-7db6d8ff4d-zl6zm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56d388b7648", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:47.441991 env[1156]: 2025-05-15 17:59:47.412 [INFO][3784] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.11.133/32] ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zl6zm" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.441991 env[1156]: 2025-05-15 17:59:47.412 [INFO][3784] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali56d388b7648 ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zl6zm" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.441991 env[1156]: 2025-05-15 17:59:47.416 [INFO][3784] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zl6zm" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.441991 env[1156]: 2025-05-15 17:59:47.418 [INFO][3784] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zl6zm" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"2d806229-6a1c-421d-88bd-29bba40b9da0", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1", Pod:"coredns-7db6d8ff4d-zl6zm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56d388b7648", MAC:"36:38:34:36:ca:a3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:47.441991 env[1156]: 2025-05-15 17:59:47.439 [INFO][3784] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zl6zm" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:47.470077 env[1156]: time="2025-05-15T17:59:47.469882343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:47.470077 env[1156]: time="2025-05-15T17:59:47.470018035Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:47.470764 env[1156]: time="2025-05-15T17:59:47.470305883Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:47.470764 env[1156]: time="2025-05-15T17:59:47.470594271Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1 pid=3840 runtime=io.containerd.runc.v2 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.499000 audit: BPF prog-id=179 op=LOAD May 15 17:59:47.499000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe3fa68e30 a2=40 a3=1 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.499000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.500000 audit: BPF prog-id=179 op=UNLOAD May 15 17:59:47.500000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.500000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe3fa68f00 a2=50 a3=7ffe3fa68fe0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.500000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.510784 systemd[1]: Started cri-containerd-d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1.scope. May 15 17:59:47.530000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.530000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3fa68e40 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3fa68e70 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3fa68d80 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3fa68e90 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3fa68e70 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3fa68e60 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3fa68e90 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3fa68e70 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3fa68e90 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3fa68e60 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.531000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.531000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3fa68ed0 a2=28 a3=0 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe3fa68c80 a2=50 a3=1 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.532000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.532000 audit: BPF prog-id=180 op=LOAD May 15 17:59:47.532000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe3fa68c80 a2=94 a3=5 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.532000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.536000 audit: BPF prog-id=180 op=UNLOAD May 15 17:59:47.536000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe3fa68d30 a2=50 a3=1 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.536000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe3fa68e50 a2=4 a3=38 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.536000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.536000 audit[3809]: AVC avc: denied { confidentiality } for pid=3809 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:59:47.536000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe3fa68ea0 a2=94 a3=6 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.536000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { confidentiality } for pid=3809 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:59:47.537000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe3fa68650 a2=94 a3=83 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.537000 audit[3809]: AVC avc: denied { confidentiality } for pid=3809 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:59:47.537000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe3fa68650 a2=94 a3=83 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.537000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.538000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.538000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3fa6a090 a2=10 a3=f0ff items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.538000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.538000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3fa69f30 a2=10 a3=3 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.538000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.538000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3fa69ed0 a2=10 a3=3 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.538000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.538000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3fa69ed0 a2=10 a3=7 items=0 ppid=3594 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:59:47.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.548000 audit: BPF prog-id=181 op=LOAD May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3840 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437356262303064613034396364383632353031313534373064623935 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3840 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437356262303064613034396364383632353031313534373064623935 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit: BPF prog-id=182 op=LOAD May 15 17:59:47.549000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003903c0 items=0 ppid=3840 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437356262303064613034396364383632353031313534373064623935 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit: BPF prog-id=183 op=LOAD May 15 17:59:47.549000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000390408 items=0 ppid=3840 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437356262303064613034396364383632353031313534373064623935 May 15 17:59:47.549000 audit: BPF prog-id=183 op=UNLOAD May 15 17:59:47.549000 audit: BPF prog-id=182 op=UNLOAD May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.549000 audit: BPF prog-id=184 op=LOAD May 15 17:59:47.549000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000390818 items=0 ppid=3840 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437356262303064613034396364383632353031313534373064623935 May 15 17:59:47.573000 audit: BPF prog-id=175 op=UNLOAD May 15 17:59:47.598256 env[1156]: time="2025-05-15T17:59:47.598206474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zl6zm,Uid:2d806229-6a1c-421d-88bd-29bba40b9da0,Namespace:kube-system,Attempt:1,} returns sandbox id \"d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1\"" May 15 17:59:47.603265 env[1156]: time="2025-05-15T17:59:47.603222577Z" level=info msg="CreateContainer within sandbox \"d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 17:59:47.699776 env[1156]: time="2025-05-15T17:59:47.699605119Z" level=info msg="CreateContainer within sandbox \"d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"aae7fd5490f84ea1e022f4979ea40d70a350ea6ecec15b14cc5aab84b5d9d856\"" May 15 17:59:47.704652 env[1156]: time="2025-05-15T17:59:47.704620631Z" level=info msg="StartContainer for \"aae7fd5490f84ea1e022f4979ea40d70a350ea6ecec15b14cc5aab84b5d9d856\"" May 15 17:59:47.733969 systemd[1]: Started cri-containerd-aae7fd5490f84ea1e022f4979ea40d70a350ea6ecec15b14cc5aab84b5d9d856.scope. May 15 17:59:47.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.788000 audit: BPF prog-id=185 op=LOAD May 15 17:59:47.789000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3840 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653766643534393066383465613165303232663439373965613430 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3840 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653766643534393066383465613165303232663439373965613430 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.789000 audit: BPF prog-id=186 op=LOAD May 15 17:59:47.789000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ab6e0 items=0 ppid=3840 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653766643534393066383465613165303232663439373965613430 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.790000 audit: BPF prog-id=187 op=LOAD May 15 17:59:47.790000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002ab728 items=0 ppid=3840 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653766643534393066383465613165303232663439373965613430 May 15 17:59:47.791000 audit: BPF prog-id=187 op=UNLOAD May 15 17:59:47.791000 audit: BPF prog-id=186 op=UNLOAD May 15 17:59:47.791000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:47.791000 audit: BPF prog-id=188 op=LOAD May 15 17:59:47.791000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002abb38 items=0 ppid=3840 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653766643534393066383465613165303232663439373965613430 May 15 17:59:47.812785 env[1156]: time="2025-05-15T17:59:47.812709390Z" level=info msg="StartContainer for \"aae7fd5490f84ea1e022f4979ea40d70a350ea6ecec15b14cc5aab84b5d9d856\" returns successfully" May 15 17:59:47.880000 audit[3938]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3938 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:59:47.880000 audit[3938]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffe7cd6410 a2=0 a3=7fffe7cd63fc items=0 ppid=3594 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.880000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:59:47.899000 audit[3935]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3935 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:59:47.899000 audit[3935]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd8d749110 a2=0 a3=7ffd8d7490fc items=0 ppid=3594 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.899000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:59:47.901000 audit[3934]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:59:47.901000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdd8232390 a2=0 a3=7ffdd823237c items=0 ppid=3594 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.901000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:59:47.914000 audit[3943]: NETFILTER_CFG table=filter:104 family=2 entries=167 op=nft_register_chain pid=3943 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:59:47.914000 audit[3943]: SYSCALL arch=c000003e syscall=46 success=yes exit=94212 a0=3 a1=7fff39567490 a2=0 a3=7fff3956747c items=0 ppid=3594 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.914000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:59:47.966000 audit[3948]: NETFILTER_CFG table=filter:105 family=2 entries=44 op=nft_register_chain pid=3948 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:59:47.966000 audit[3948]: SYSCALL arch=c000003e syscall=46 success=yes exit=22244 a0=3 a1=7fffcd04fb70 a2=0 a3=7fffcd04fb5c items=0 ppid=3594 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:47.966000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:59:48.250000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:48.250000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00f1db760 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:59:48.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:59:48.250000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:48.250000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00f8aacf0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:59:48.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:59:48.251000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:48.251000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00f8aad80 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:59:48.251000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:59:48.268000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:48.268000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00f213110 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:59:48.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:59:48.268000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:48.268000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00f0ee0c0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:59:48.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:59:48.276000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:48.276000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00f2131a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 17:59:48.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 17:59:48.338000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:48.338000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00186a570 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:59:48.338000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:59:48.342000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 17:59:48.342000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028d2ba0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 17:59:48.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 17:59:48.371000 audit[3952]: NETFILTER_CFG table=filter:106 family=2 entries=10 op=nft_register_rule pid=3952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:48.371000 audit[3952]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffedfb64280 a2=0 a3=7ffedfb6426c items=0 ppid=2219 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:48.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:48.376000 audit[3952]: NETFILTER_CFG table=nat:107 family=2 entries=44 op=nft_register_rule pid=3952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:48.376000 audit[3952]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffedfb64280 a2=0 a3=7ffedfb6426c items=0 ppid=2219 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:48.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:48.577889 env[1156]: time="2025-05-15T17:59:48.576833269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:48.581669 env[1156]: time="2025-05-15T17:59:48.581631324Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:48.584463 env[1156]: time="2025-05-15T17:59:48.584399551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:48.586833 env[1156]: time="2025-05-15T17:59:48.586804295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:48.588125 env[1156]: time="2025-05-15T17:59:48.587564115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 17:59:48.591774 env[1156]: time="2025-05-15T17:59:48.589664991Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 17:59:48.595900 env[1156]: time="2025-05-15T17:59:48.595858277Z" level=info msg="CreateContainer within sandbox \"fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 17:59:48.622310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1063890237.mount: Deactivated successfully. May 15 17:59:48.628543 systemd-networkd[980]: cali5de1fc79fa7: Gained IPv6LL May 15 17:59:48.647854 env[1156]: time="2025-05-15T17:59:48.640183838Z" level=info msg="CreateContainer within sandbox \"fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2e664cb4288bae5e85653babf08f9acb86aff933bee14d6a5f277377987677ae\"" May 15 17:59:48.647854 env[1156]: time="2025-05-15T17:59:48.642336314Z" level=info msg="StartContainer for \"2e664cb4288bae5e85653babf08f9acb86aff933bee14d6a5f277377987677ae\"" May 15 17:59:48.698768 systemd[1]: Started cri-containerd-2e664cb4288bae5e85653babf08f9acb86aff933bee14d6a5f277377987677ae.scope. May 15 17:59:48.729000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fae8400db18 items=0 ppid=3362 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:48.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363634636234323838626165356538353635336261626630386639 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.729000 audit: BPF prog-id=189 op=LOAD May 15 17:59:48.729000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028afd8 items=0 ppid=3362 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:48.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363634636234323838626165356538353635336261626630386639 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.730000 audit: BPF prog-id=190 op=LOAD May 15 17:59:48.730000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028b028 items=0 ppid=3362 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:48.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363634636234323838626165356538353635336261626630386639 May 15 17:59:48.731000 audit: BPF prog-id=190 op=UNLOAD May 15 17:59:48.731000 audit: BPF prog-id=189 op=UNLOAD May 15 17:59:48.731000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:48.731000 audit: BPF prog-id=191 op=LOAD May 15 17:59:48.731000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028b0b8 items=0 ppid=3362 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:48.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363634636234323838626165356538353635336261626630386639 May 15 17:59:48.764260 env[1156]: time="2025-05-15T17:59:48.764140117Z" level=info msg="StartContainer for \"2e664cb4288bae5e85653babf08f9acb86aff933bee14d6a5f277377987677ae\" returns successfully" May 15 17:59:49.140383 systemd-networkd[980]: vxlan.calico: Gained IPv6LL May 15 17:59:49.141423 systemd-networkd[980]: cali56d388b7648: Gained IPv6LL May 15 17:59:49.186602 systemd[1]: run-containerd-runc-k8s.io-2e664cb4288bae5e85653babf08f9acb86aff933bee14d6a5f277377987677ae-runc.DbFZJg.mount: Deactivated successfully. May 15 17:59:49.364407 kubelet[2041]: I0515 17:59:49.364070 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-zl6zm" podStartSLOduration=44.363860261 podStartE2EDuration="44.363860261s" podCreationTimestamp="2025-05-15 17:59:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 17:59:48.344429495 +0000 UTC m=+56.558967927" watchObservedRunningTime="2025-05-15 17:59:49.363860261 +0000 UTC m=+57.578398733" May 15 17:59:49.414000 audit[3990]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:49.420103 kernel: kauditd_printk_skb: 1035 callbacks suppressed May 15 17:59:49.420284 kernel: audit: type=1325 audit(1747331989.414:1266): table=filter:108 family=2 entries=10 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:49.414000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff5f1c8c80 a2=0 a3=7fff5f1c8c6c items=0 ppid=2219 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:49.445780 kernel: audit: type=1300 audit(1747331989.414:1266): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff5f1c8c80 a2=0 a3=7fff5f1c8c6c items=0 ppid=2219 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:49.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:49.450754 kernel: audit: type=1327 audit(1747331989.414:1266): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:49.452000 audit[3990]: NETFILTER_CFG table=nat:109 family=2 entries=56 op=nft_register_chain pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:49.452000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff5f1c8c80 a2=0 a3=7fff5f1c8c6c items=0 ppid=2219 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:49.469622 kernel: audit: type=1325 audit(1747331989.452:1267): table=nat:109 family=2 entries=56 op=nft_register_chain pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:49.469712 kernel: audit: type=1300 audit(1747331989.452:1267): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff5f1c8c80 a2=0 a3=7fff5f1c8c6c items=0 ppid=2219 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:49.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:49.473788 kernel: audit: type=1327 audit(1747331989.452:1267): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:51.967134 env[1156]: time="2025-05-15T17:59:51.967044584Z" level=info msg="StopPodSandbox for \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\"" May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.044 [WARNING][4008] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"553cc4bb-81bc-4c56-9d31-50bba5210009", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b", Pod:"coredns-7db6d8ff4d-pb597", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0ca77a2cda9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.044 [INFO][4008] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.044 [INFO][4008] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" iface="eth0" netns="" May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.044 [INFO][4008] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.044 [INFO][4008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.089 [INFO][4015] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.089 [INFO][4015] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.089 [INFO][4015] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.099 [WARNING][4015] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.099 [INFO][4015] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.101 [INFO][4015] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:52.104468 env[1156]: 2025-05-15 17:59:52.102 [INFO][4008] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:52.105169 env[1156]: time="2025-05-15T17:59:52.104518891Z" level=info msg="TearDown network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\" successfully" May 15 17:59:52.105169 env[1156]: time="2025-05-15T17:59:52.104563717Z" level=info msg="StopPodSandbox for \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\" returns successfully" May 15 17:59:52.106252 env[1156]: time="2025-05-15T17:59:52.106213313Z" level=info msg="RemovePodSandbox for \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\"" May 15 17:59:52.106366 env[1156]: time="2025-05-15T17:59:52.106267728Z" level=info msg="Forcibly stopping sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\"" May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.159 [WARNING][4034] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"553cc4bb-81bc-4c56-9d31-50bba5210009", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"29a80406254aa633eb46bdfa2cdb0ed5b7e133fcade04808b0ecd4d8f81aa62b", Pod:"coredns-7db6d8ff4d-pb597", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0ca77a2cda9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.159 [INFO][4034] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.159 [INFO][4034] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" iface="eth0" netns="" May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.159 [INFO][4034] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.159 [INFO][4034] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.199 [INFO][4041] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.199 [INFO][4041] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.199 [INFO][4041] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.207 [WARNING][4041] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.207 [INFO][4041] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" HandleID="k8s-pod-network.cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--pb597-eth0" May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.210 [INFO][4041] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:52.213362 env[1156]: 2025-05-15 17:59:52.211 [INFO][4034] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948" May 15 17:59:52.214198 env[1156]: time="2025-05-15T17:59:52.214155785Z" level=info msg="TearDown network for sandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\" successfully" May 15 17:59:52.221607 env[1156]: time="2025-05-15T17:59:52.221509496Z" level=info msg="RemovePodSandbox \"cddf35bc5de92dbf84b59555041126b9653746e053231beccbc8c0691e1db948\" returns successfully" May 15 17:59:52.223804 env[1156]: time="2025-05-15T17:59:52.223756346Z" level=info msg="StopPodSandbox for \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\"" May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.281 [WARNING][4061] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0", GenerateName:"calico-apiserver-667fcfb984-", Namespace:"calico-apiserver", SelfLink:"", UID:"8031d6c5-d59f-4cb4-803d-ea905d3adb6a", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"667fcfb984", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e", Pod:"calico-apiserver-667fcfb984-rh9xh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7156b06aab2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.282 [INFO][4061] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.282 [INFO][4061] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" iface="eth0" netns="" May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.282 [INFO][4061] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.282 [INFO][4061] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.321 [INFO][4068] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.321 [INFO][4068] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.321 [INFO][4068] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.338 [WARNING][4068] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.338 [INFO][4068] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.341 [INFO][4068] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:52.358925 env[1156]: 2025-05-15 17:59:52.356 [INFO][4061] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:52.359679 env[1156]: time="2025-05-15T17:59:52.359635058Z" level=info msg="TearDown network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\" successfully" May 15 17:59:52.359805 env[1156]: time="2025-05-15T17:59:52.359781801Z" level=info msg="StopPodSandbox for \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\" returns successfully" May 15 17:59:52.360518 env[1156]: time="2025-05-15T17:59:52.360491833Z" level=info msg="RemovePodSandbox for \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\"" May 15 17:59:52.360700 env[1156]: time="2025-05-15T17:59:52.360642674Z" level=info msg="Forcibly stopping sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\"" May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.413 [WARNING][4088] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0", GenerateName:"calico-apiserver-667fcfb984-", Namespace:"calico-apiserver", SelfLink:"", UID:"8031d6c5-d59f-4cb4-803d-ea905d3adb6a", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"667fcfb984", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e", Pod:"calico-apiserver-667fcfb984-rh9xh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7156b06aab2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.413 [INFO][4088] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.413 [INFO][4088] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" iface="eth0" netns="" May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.413 [INFO][4088] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.413 [INFO][4088] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.456 [INFO][4095] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.456 [INFO][4095] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.457 [INFO][4095] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.466 [WARNING][4095] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.466 [INFO][4095] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" HandleID="k8s-pod-network.da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--rh9xh-eth0" May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.469 [INFO][4095] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:52.471987 env[1156]: 2025-05-15 17:59:52.470 [INFO][4088] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d" May 15 17:59:52.473548 env[1156]: time="2025-05-15T17:59:52.473473184Z" level=info msg="TearDown network for sandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\" successfully" May 15 17:59:52.478561 env[1156]: time="2025-05-15T17:59:52.478531794Z" level=info msg="RemovePodSandbox \"da8a3a0688d100879ff341ae1c4ba68755d71950d7576f8d4886afd152395f9d\" returns successfully" May 15 17:59:52.479257 env[1156]: time="2025-05-15T17:59:52.479208762Z" level=info msg="StopPodSandbox for \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\"" May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.533 [WARNING][4113] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0", GenerateName:"calico-kube-controllers-7c9d79cc5c-", Namespace:"calico-system", SelfLink:"", UID:"2d177649-dd03-410c-bb37-8159f7697b6b", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c9d79cc5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd", Pod:"calico-kube-controllers-7c9d79cc5c-vzr74", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.11.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5de1fc79fa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.533 [INFO][4113] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.533 [INFO][4113] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" iface="eth0" netns="" May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.533 [INFO][4113] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.533 [INFO][4113] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.567 [INFO][4120] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.567 [INFO][4120] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.567 [INFO][4120] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.577 [WARNING][4120] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.578 [INFO][4120] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.580 [INFO][4120] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:52.583353 env[1156]: 2025-05-15 17:59:52.582 [INFO][4113] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:52.583975 env[1156]: time="2025-05-15T17:59:52.583432801Z" level=info msg="TearDown network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\" successfully" May 15 17:59:52.583975 env[1156]: time="2025-05-15T17:59:52.583484782Z" level=info msg="StopPodSandbox for \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\" returns successfully" May 15 17:59:52.584511 env[1156]: time="2025-05-15T17:59:52.584472018Z" level=info msg="RemovePodSandbox for \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\"" May 15 17:59:52.584665 env[1156]: time="2025-05-15T17:59:52.584605867Z" level=info msg="Forcibly stopping sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\"" May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.627 [WARNING][4140] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0", GenerateName:"calico-kube-controllers-7c9d79cc5c-", Namespace:"calico-system", SelfLink:"", UID:"2d177649-dd03-410c-bb37-8159f7697b6b", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c9d79cc5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd", Pod:"calico-kube-controllers-7c9d79cc5c-vzr74", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.11.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5de1fc79fa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.627 [INFO][4140] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.627 [INFO][4140] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" iface="eth0" netns="" May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.627 [INFO][4140] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.627 [INFO][4140] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.650 [INFO][4147] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.650 [INFO][4147] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.650 [INFO][4147] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.658 [WARNING][4147] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.658 [INFO][4147] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" HandleID="k8s-pod-network.8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--kube--controllers--7c9d79cc5c--vzr74-eth0" May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.661 [INFO][4147] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:52.663422 env[1156]: 2025-05-15 17:59:52.662 [INFO][4140] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6" May 15 17:59:52.664481 env[1156]: time="2025-05-15T17:59:52.663476113Z" level=info msg="TearDown network for sandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\" successfully" May 15 17:59:52.751807 env[1156]: time="2025-05-15T17:59:52.751669404Z" level=info msg="RemovePodSandbox \"8aa049702539aacd40e181453db7f4a04e1988240eeab7cde78ca120804257c6\" returns successfully" May 15 17:59:52.754576 env[1156]: time="2025-05-15T17:59:52.754507516Z" level=info msg="StopPodSandbox for \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\"" May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.862 [WARNING][4168] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"2d806229-6a1c-421d-88bd-29bba40b9da0", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1", Pod:"coredns-7db6d8ff4d-zl6zm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56d388b7648", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.863 [INFO][4168] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.863 [INFO][4168] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" iface="eth0" netns="" May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.863 [INFO][4168] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.863 [INFO][4168] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.890 [INFO][4175] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.890 [INFO][4175] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.890 [INFO][4175] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.899 [WARNING][4175] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.899 [INFO][4175] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.901 [INFO][4175] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:52.903578 env[1156]: 2025-05-15 17:59:52.902 [INFO][4168] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:52.904443 env[1156]: time="2025-05-15T17:59:52.903606840Z" level=info msg="TearDown network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\" successfully" May 15 17:59:52.904443 env[1156]: time="2025-05-15T17:59:52.903645354Z" level=info msg="StopPodSandbox for \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\" returns successfully" May 15 17:59:52.904443 env[1156]: time="2025-05-15T17:59:52.904128668Z" level=info msg="RemovePodSandbox for \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\"" May 15 17:59:52.904443 env[1156]: time="2025-05-15T17:59:52.904158215Z" level=info msg="Forcibly stopping sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\"" May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:52.994 [WARNING][4200] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"2d806229-6a1c-421d-88bd-29bba40b9da0", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"d75bb00da049cd86250115470db95bc31e5b46796e777a4a254f2700d9b24cd1", Pod:"coredns-7db6d8ff4d-zl6zm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56d388b7648", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:52.994 [INFO][4200] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:52.994 [INFO][4200] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" iface="eth0" netns="" May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:52.994 [INFO][4200] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:52.994 [INFO][4200] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:53.028 [INFO][4209] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:53.028 [INFO][4209] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:53.028 [INFO][4209] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:53.038 [WARNING][4209] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:53.038 [INFO][4209] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" HandleID="k8s-pod-network.c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-coredns--7db6d8ff4d--zl6zm-eth0" May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:53.040 [INFO][4209] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:53.045610 env[1156]: 2025-05-15 17:59:53.044 [INFO][4200] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2" May 15 17:59:53.046987 env[1156]: time="2025-05-15T17:59:53.046935899Z" level=info msg="TearDown network for sandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\" successfully" May 15 17:59:53.051190 env[1156]: time="2025-05-15T17:59:53.051158400Z" level=info msg="RemovePodSandbox \"c0dbcf552d22a5ccee88932e0c51d9eb54776e327e9a931fb77cc35148a7acd2\" returns successfully" May 15 17:59:53.051933 env[1156]: time="2025-05-15T17:59:53.051911483Z" level=info msg="StopPodSandbox for \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\"" May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.122 [WARNING][4230] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f6812bd3-d952-466a-8323-4afab6f4de1a", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e", Pod:"csi-node-driver-2cnjs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.11.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali77ad82bb16e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.122 [INFO][4230] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.122 [INFO][4230] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" iface="eth0" netns="" May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.122 [INFO][4230] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.122 [INFO][4230] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.152 [INFO][4237] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.152 [INFO][4237] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.152 [INFO][4237] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.165 [WARNING][4237] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.165 [INFO][4237] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.166 [INFO][4237] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:53.169329 env[1156]: 2025-05-15 17:59:53.168 [INFO][4230] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:53.170128 env[1156]: time="2025-05-15T17:59:53.170070554Z" level=info msg="TearDown network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\" successfully" May 15 17:59:53.170218 env[1156]: time="2025-05-15T17:59:53.170198010Z" level=info msg="StopPodSandbox for \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\" returns successfully" May 15 17:59:53.171400 env[1156]: time="2025-05-15T17:59:53.171376926Z" level=info msg="RemovePodSandbox for \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\"" May 15 17:59:53.171548 env[1156]: time="2025-05-15T17:59:53.171502939Z" level=info msg="Forcibly stopping sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\"" May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.278 [WARNING][4258] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f6812bd3-d952-466a-8323-4afab6f4de1a", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e", Pod:"csi-node-driver-2cnjs", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.11.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali77ad82bb16e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.278 [INFO][4258] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.278 [INFO][4258] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" iface="eth0" netns="" May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.278 [INFO][4258] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.278 [INFO][4258] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.307 [INFO][4265] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.307 [INFO][4265] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.307 [INFO][4265] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.315 [WARNING][4265] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.315 [INFO][4265] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" HandleID="k8s-pod-network.3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-csi--node--driver--2cnjs-eth0" May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.317 [INFO][4265] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:53.319285 env[1156]: 2025-05-15 17:59:53.318 [INFO][4258] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0" May 15 17:59:53.321132 env[1156]: time="2025-05-15T17:59:53.319228032Z" level=info msg="TearDown network for sandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\" successfully" May 15 17:59:53.325837 env[1156]: time="2025-05-15T17:59:53.325799937Z" level=info msg="RemovePodSandbox \"3214f7ae3c16d27b1ac5219cac9b5ee9f11dadb3cc1ae0617886bc2cdb45abb0\" returns successfully" May 15 17:59:54.354705 env[1156]: time="2025-05-15T17:59:54.354582779Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:54.358631 env[1156]: time="2025-05-15T17:59:54.358569041Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:54.362013 env[1156]: time="2025-05-15T17:59:54.361321781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:54.364947 env[1156]: time="2025-05-15T17:59:54.364891719Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:54.365300 env[1156]: time="2025-05-15T17:59:54.365200846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 17:59:54.367720 env[1156]: time="2025-05-15T17:59:54.367639671Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 17:59:54.371816 env[1156]: time="2025-05-15T17:59:54.371713281Z" level=info msg="CreateContainer within sandbox \"fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 17:59:54.400596 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount44579987.mount: Deactivated successfully. May 15 17:59:54.410515 env[1156]: time="2025-05-15T17:59:54.410446052Z" level=info msg="CreateContainer within sandbox \"fb36d9a33cdb9c18f5ed56c8fda646163264f1c8e9a25aff39c7f2bee292134e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e5ed2daee17df25cc33e1ced9b5bfa45b367f9efbb6e2481ed9b8d340d41ecb3\"" May 15 17:59:54.412804 env[1156]: time="2025-05-15T17:59:54.411319607Z" level=info msg="StartContainer for \"e5ed2daee17df25cc33e1ced9b5bfa45b367f9efbb6e2481ed9b8d340d41ecb3\"" May 15 17:59:54.445219 systemd[1]: Started cri-containerd-e5ed2daee17df25cc33e1ced9b5bfa45b367f9efbb6e2481ed9b8d340d41ecb3.scope. May 15 17:59:54.483769 kernel: audit: type=1400 audit(1747331994.476:1268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.483896 kernel: audit: type=1400 audit(1747331994.476:1269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.497868 kernel: audit: type=1400 audit(1747331994.476:1270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.497938 kernel: audit: type=1400 audit(1747331994.476:1271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.497994 kernel: audit: type=1400 audit(1747331994.476:1272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.507684 kernel: audit: type=1400 audit(1747331994.476:1273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.507825 kernel: audit: type=1400 audit(1747331994.476:1274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.517770 kernel: audit: type=1400 audit(1747331994.476:1275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.522764 kernel: audit: type=1400 audit(1747331994.476:1276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.522833 kernel: audit: type=1400 audit(1747331994.481:1277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.481000 audit: BPF prog-id=192 op=LOAD May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3443 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:54.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656432646165653137646632356363333365316365643962356266 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3443 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:54.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656432646165653137646632356363333365316365643962356266 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit: BPF prog-id=193 op=LOAD May 15 17:59:54.487000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e7af0 items=0 ppid=3443 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:54.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656432646165653137646632356363333365316365643962356266 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit: BPF prog-id=194 op=LOAD May 15 17:59:54.487000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e7b38 items=0 ppid=3443 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:54.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656432646165653137646632356363333365316365643962356266 May 15 17:59:54.487000 audit: BPF prog-id=194 op=UNLOAD May 15 17:59:54.487000 audit: BPF prog-id=193 op=UNLOAD May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:54.487000 audit: BPF prog-id=195 op=LOAD May 15 17:59:54.487000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e7f48 items=0 ppid=3443 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:54.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535656432646165653137646632356363333365316365643962356266 May 15 17:59:54.550141 env[1156]: time="2025-05-15T17:59:54.550061634Z" level=info msg="StartContainer for \"e5ed2daee17df25cc33e1ced9b5bfa45b367f9efbb6e2481ed9b8d340d41ecb3\" returns successfully" May 15 17:59:55.428000 audit[4311]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:55.428000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffeb189d4e0 a2=0 a3=7ffeb189d4cc items=0 ppid=2219 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:55.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:55.433000 audit[4311]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:55.433000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeb189d4e0 a2=0 a3=7ffeb189d4cc items=0 ppid=2219 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:55.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:55.942613 env[1156]: time="2025-05-15T17:59:55.942517639Z" level=info msg="StopPodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\"" May 15 17:59:56.047316 kubelet[2041]: I0515 17:59:56.047185 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-667fcfb984-rh9xh" podStartSLOduration=34.491848278 podStartE2EDuration="43.047119025s" podCreationTimestamp="2025-05-15 17:59:13 +0000 UTC" firstStartedPulling="2025-05-15 17:59:45.811724541 +0000 UTC m=+54.026262963" lastFinishedPulling="2025-05-15 17:59:54.366995288 +0000 UTC m=+62.581533710" observedRunningTime="2025-05-15 17:59:55.387921563 +0000 UTC m=+63.602459985" watchObservedRunningTime="2025-05-15 17:59:56.047119025 +0000 UTC m=+64.261657457" May 15 17:59:56.109000 audit[4291]: AVC avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 17:59:56.109000 audit[4291]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000afc2a0 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 17:59:56.109000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.049 [INFO][4325] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.049 [INFO][4325] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" iface="eth0" netns="/var/run/netns/cni-0db96877-13dd-df7d-52f4-16ff61f522e7" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.049 [INFO][4325] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" iface="eth0" netns="/var/run/netns/cni-0db96877-13dd-df7d-52f4-16ff61f522e7" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.049 [INFO][4325] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" iface="eth0" netns="/var/run/netns/cni-0db96877-13dd-df7d-52f4-16ff61f522e7" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.049 [INFO][4325] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.049 [INFO][4325] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.100 [INFO][4332] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.134 [INFO][4332] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.134 [INFO][4332] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.141 [WARNING][4332] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.141 [INFO][4332] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.143 [INFO][4332] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:56.145862 env[1156]: 2025-05-15 17:59:56.144 [INFO][4325] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 17:59:56.151590 env[1156]: time="2025-05-15T17:59:56.151220287Z" level=info msg="TearDown network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\" successfully" May 15 17:59:56.151590 env[1156]: time="2025-05-15T17:59:56.151264542Z" level=info msg="StopPodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\" returns successfully" May 15 17:59:56.150388 systemd[1]: run-netns-cni\x2d0db96877\x2d13dd\x2ddf7d\x2d52f4\x2d16ff61f522e7.mount: Deactivated successfully. May 15 17:59:56.161920 env[1156]: time="2025-05-15T17:59:56.161860558Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-667fcfb984-4gvrr,Uid:bbc51e4d-e705-4cb0-b394-204802a51d29,Namespace:calico-apiserver,Attempt:1,}" May 15 17:59:56.248000 audit[4347]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=4347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:56.248000 audit[4347]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff368cd9f0 a2=0 a3=7fff368cd9dc items=0 ppid=2219 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:56.253000 audit[4347]: NETFILTER_CFG table=nat:113 family=2 entries=27 op=nft_register_chain pid=4347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:56.253000 audit[4347]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff368cd9f0 a2=0 a3=7fff368cd9dc items=0 ppid=2219 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:56.415803 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif1f289940e7: link becomes ready May 15 17:59:56.416512 systemd-networkd[980]: calif1f289940e7: Link UP May 15 17:59:56.416724 systemd-networkd[980]: calif1f289940e7: Gained carrier May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.267 [INFO][4339] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0 calico-apiserver-667fcfb984- calico-apiserver bbc51e4d-e705-4cb0-b394-204802a51d29 876 0 2025-05-15 17:59:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:667fcfb984 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-100-3e5a09d652.novalocal calico-apiserver-667fcfb984-4gvrr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif1f289940e7 [] []}} ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-4gvrr" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.267 [INFO][4339] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-4gvrr" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.340 [INFO][4353] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" HandleID="k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.370 [INFO][4353] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" HandleID="k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312a40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-100-3e5a09d652.novalocal", "pod":"calico-apiserver-667fcfb984-4gvrr", "timestamp":"2025-05-15 17:59:56.340107058 +0000 UTC"}, Hostname:"ci-3510-3-100-3e5a09d652.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.370 [INFO][4353] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.371 [INFO][4353] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.371 [INFO][4353] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-100-3e5a09d652.novalocal' May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.373 [INFO][4353] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.378 [INFO][4353] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.383 [INFO][4353] ipam/ipam.go 489: Trying affinity for 192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.386 [INFO][4353] ipam/ipam.go 155: Attempting to load block cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.389 [INFO][4353] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.128/26 host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.389 [INFO][4353] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.128/26 handle="k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.391 [INFO][4353] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5 May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.398 [INFO][4353] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.11.128/26 handle="k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.408 [INFO][4353] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.11.134/26] block=192.168.11.128/26 handle="k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.408 [INFO][4353] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.134/26] handle="k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" host="ci-3510-3-100-3e5a09d652.novalocal" May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.408 [INFO][4353] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:59:56.433115 env[1156]: 2025-05-15 17:59:56.408 [INFO][4353] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.11.134/26] IPv6=[] ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" HandleID="k8s-pod-network.808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.434109 env[1156]: 2025-05-15 17:59:56.409 [INFO][4339] cni-plugin/k8s.go 386: Populated endpoint ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-4gvrr" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0", GenerateName:"calico-apiserver-667fcfb984-", Namespace:"calico-apiserver", SelfLink:"", UID:"bbc51e4d-e705-4cb0-b394-204802a51d29", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"667fcfb984", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"", Pod:"calico-apiserver-667fcfb984-4gvrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif1f289940e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:56.434109 env[1156]: 2025-05-15 17:59:56.410 [INFO][4339] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.11.134/32] ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-4gvrr" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.434109 env[1156]: 2025-05-15 17:59:56.410 [INFO][4339] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif1f289940e7 ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-4gvrr" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.434109 env[1156]: 2025-05-15 17:59:56.411 [INFO][4339] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-4gvrr" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.434109 env[1156]: 2025-05-15 17:59:56.420 [INFO][4339] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-4gvrr" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0", GenerateName:"calico-apiserver-667fcfb984-", Namespace:"calico-apiserver", SelfLink:"", UID:"bbc51e4d-e705-4cb0-b394-204802a51d29", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"667fcfb984", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5", Pod:"calico-apiserver-667fcfb984-4gvrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif1f289940e7", MAC:"5e:3b:d3:44:e1:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:59:56.434109 env[1156]: 2025-05-15 17:59:56.431 [INFO][4339] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5" Namespace="calico-apiserver" Pod="calico-apiserver-667fcfb984-4gvrr" WorkloadEndpoint="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 17:59:56.471561 env[1156]: time="2025-05-15T17:59:56.471190844Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:59:56.471561 env[1156]: time="2025-05-15T17:59:56.471327928Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:59:56.471561 env[1156]: time="2025-05-15T17:59:56.471349239Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:59:56.472668 env[1156]: time="2025-05-15T17:59:56.472553390Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5 pid=4380 runtime=io.containerd.runc.v2 May 15 17:59:56.499000 audit[4395]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4395 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:59:56.499000 audit[4395]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffcc8a20120 a2=0 a3=7ffcc8a2010c items=0 ppid=3594 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:59:56.531441 systemd[1]: Started cri-containerd-808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5.scope. May 15 17:59:56.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.594000 audit: BPF prog-id=196 op=LOAD May 15 17:59:56.595000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.595000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4380 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386564633637323531373932346165626239383338303366366638 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4380 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386564633637323531373932346165626239383338303366366638 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.596000 audit: BPF prog-id=197 op=LOAD May 15 17:59:56.596000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002ebd80 items=0 ppid=4380 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386564633637323531373932346165626239383338303366366638 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.598000 audit: BPF prog-id=198 op=LOAD May 15 17:59:56.598000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002ebdc8 items=0 ppid=4380 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386564633637323531373932346165626239383338303366366638 May 15 17:59:56.599000 audit: BPF prog-id=198 op=UNLOAD May 15 17:59:56.599000 audit: BPF prog-id=197 op=UNLOAD May 15 17:59:56.600000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.600000 audit: BPF prog-id=199 op=LOAD May 15 17:59:56.600000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003e41d8 items=0 ppid=4380 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386564633637323531373932346165626239383338303366366638 May 15 17:59:56.667272 env[1156]: time="2025-05-15T17:59:56.667151470Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-667fcfb984-4gvrr,Uid:bbc51e4d-e705-4cb0-b394-204802a51d29,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5\"" May 15 17:59:56.673437 env[1156]: time="2025-05-15T17:59:56.673398152Z" level=info msg="CreateContainer within sandbox \"808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 17:59:56.802569 env[1156]: time="2025-05-15T17:59:56.799802116Z" level=info msg="CreateContainer within sandbox \"808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"eff4f5dd7a8b53a1e80ae897d2ec77371f1d8f3f9379ace41ea261358c2923e3\"" May 15 17:59:56.804613 env[1156]: time="2025-05-15T17:59:56.804496134Z" level=info msg="StartContainer for \"eff4f5dd7a8b53a1e80ae897d2ec77371f1d8f3f9379ace41ea261358c2923e3\"" May 15 17:59:56.835792 systemd[1]: Started cri-containerd-eff4f5dd7a8b53a1e80ae897d2ec77371f1d8f3f9379ace41ea261358c2923e3.scope. May 15 17:59:56.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.875000 audit: BPF prog-id=200 op=LOAD May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4380 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663466356464376138623533613165383061653839376432656337 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=4380 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663466356464376138623533613165383061653839376432656337 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit: BPF prog-id=201 op=LOAD May 15 17:59:56.876000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000245cc0 items=0 ppid=4380 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663466356464376138623533613165383061653839376432656337 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit: BPF prog-id=202 op=LOAD May 15 17:59:56.876000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000245d08 items=0 ppid=4380 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663466356464376138623533613165383061653839376432656337 May 15 17:59:56.876000 audit: BPF prog-id=202 op=UNLOAD May 15 17:59:56.876000 audit: BPF prog-id=201 op=UNLOAD May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:56.876000 audit: BPF prog-id=203 op=LOAD May 15 17:59:56.876000 audit[4423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00038a118 items=0 ppid=4380 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:56.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663466356464376138623533613165383061653839376432656337 May 15 17:59:56.948765 env[1156]: time="2025-05-15T17:59:56.948676576Z" level=info msg="StartContainer for \"eff4f5dd7a8b53a1e80ae897d2ec77371f1d8f3f9379ace41ea261358c2923e3\" returns successfully" May 15 17:59:57.153400 systemd[1]: run-containerd-runc-k8s.io-808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5-runc.QAxils.mount: Deactivated successfully. May 15 17:59:57.474000 audit[4455]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4455 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:57.474000 audit[4455]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff1559b8e0 a2=0 a3=7fff1559b8cc items=0 ppid=2219 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:57.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:57.481000 audit[4455]: NETFILTER_CFG table=nat:116 family=2 entries=30 op=nft_register_rule pid=4455 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:57.481000 audit[4455]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff1559b8e0 a2=0 a3=7fff1559b8cc items=0 ppid=2219 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:57.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:57.990065 systemd-networkd[980]: calif1f289940e7: Gained IPv6LL May 15 17:59:58.390553 kubelet[2041]: I0515 17:59:58.389751 2041 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 17:59:59.033000 audit[4435]: AVC avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 17:59:59.033000 audit[4435]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f85ae0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 17:59:59.033000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 17:59:59.074255 kubelet[2041]: I0515 17:59:59.072245 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-667fcfb984-4gvrr" podStartSLOduration=46.072203687 podStartE2EDuration="46.072203687s" podCreationTimestamp="2025-05-15 17:59:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 17:59:57.411720011 +0000 UTC m=+65.626258443" watchObservedRunningTime="2025-05-15 17:59:59.072203687 +0000 UTC m=+67.286742119" May 15 17:59:59.111000 audit[4464]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:59.111000 audit[4464]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc3f974d70 a2=0 a3=7ffc3f974d5c items=0 ppid=2219 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:59.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:59.116000 audit[4464]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=4464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:59:59.116000 audit[4464]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc3f974d70 a2=0 a3=7ffc3f974d5c items=0 ppid=2219 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:59.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:59:59.370301 env[1156]: time="2025-05-15T17:59:59.369775024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:59.373693 env[1156]: time="2025-05-15T17:59:59.373567495Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:59.377179 env[1156]: time="2025-05-15T17:59:59.377123803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:59.379954 env[1156]: time="2025-05-15T17:59:59.379901059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:59:59.381445 env[1156]: time="2025-05-15T17:59:59.381389374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 17:59:59.384176 env[1156]: time="2025-05-15T17:59:59.384123349Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 17:59:59.414937 env[1156]: time="2025-05-15T17:59:59.414886105Z" level=info msg="CreateContainer within sandbox \"32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 17:59:59.435950 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2475694212.mount: Deactivated successfully. May 15 17:59:59.447491 env[1156]: time="2025-05-15T17:59:59.447405955Z" level=info msg="CreateContainer within sandbox \"32e39678ecb8a9a0282a85544f460b56dd8ec8002327a0f6450a9139417aeadd\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77\"" May 15 17:59:59.449496 env[1156]: time="2025-05-15T17:59:59.449132770Z" level=info msg="StartContainer for \"e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77\"" May 15 17:59:59.480248 systemd[1]: Started cri-containerd-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77.scope. May 15 17:59:59.514560 kernel: kauditd_printk_skb: 194 callbacks suppressed May 15 17:59:59.514705 kernel: audit: type=1400 audit(1747331999.507:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.514776 kernel: audit: type=1400 audit(1747331999.507:1334): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524852 kernel: audit: type=1400 audit(1747331999.507:1335): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.531843 kernel: audit: type=1400 audit(1747331999.507:1336): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.543293 kernel: audit: type=1400 audit(1747331999.507:1337): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.543368 kernel: audit: type=1400 audit(1747331999.507:1338): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.555876 kernel: audit: type=1400 audit(1747331999.507:1339): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.555966 kernel: audit: type=1400 audit(1747331999.507:1340): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.560781 kernel: audit: type=1400 audit(1747331999.507:1341): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.565585 kernel: audit: type=1400 audit(1747331999.519:1342): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.519000 audit: BPF prog-id=204 op=LOAD May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3725 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:59.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323837336333373666396261633939303239653932366637356430 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3725 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:59.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323837336333373666396261633939303239653932366637356430 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit: BPF prog-id=205 op=LOAD May 15 17:59:59.524000 audit[4475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00025dd10 items=0 ppid=3725 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:59.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323837336333373666396261633939303239653932366637356430 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.524000 audit: BPF prog-id=206 op=LOAD May 15 17:59:59.524000 audit[4475]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00025dd58 items=0 ppid=3725 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:59.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323837336333373666396261633939303239653932366637356430 May 15 17:59:59.524000 audit: BPF prog-id=206 op=UNLOAD May 15 17:59:59.524000 audit: BPF prog-id=205 op=UNLOAD May 15 17:59:59.525000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:59:59.525000 audit: BPF prog-id=207 op=LOAD May 15 17:59:59.525000 audit[4475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003e4168 items=0 ppid=3725 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:59:59.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323837336333373666396261633939303239653932366637356430 May 15 17:59:59.588693 env[1156]: time="2025-05-15T17:59:59.588626654Z" level=info msg="StartContainer for \"e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77\" returns successfully" May 15 18:00:00.522994 kubelet[2041]: I0515 18:00:00.522929 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7c9d79cc5c-vzr74" podStartSLOduration=35.289835735 podStartE2EDuration="47.522909698s" podCreationTimestamp="2025-05-15 17:59:13 +0000 UTC" firstStartedPulling="2025-05-15 17:59:47.15002821 +0000 UTC m=+55.364566632" lastFinishedPulling="2025-05-15 17:59:59.383102133 +0000 UTC m=+67.597640595" observedRunningTime="2025-05-15 18:00:00.462364648 +0000 UTC m=+68.676903120" watchObservedRunningTime="2025-05-15 18:00:00.522909698 +0000 UTC m=+68.737448120" May 15 18:00:02.563000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:02.563000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e1a500 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:00:02.563000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:00:02.563000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:02.563000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:02.563000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00108ed00 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:00:02.563000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:00:02.563000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e1a800 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:00:02.563000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:00:02.566000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:02.566000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e1a840 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:00:02.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:00:06.829942 env[1156]: time="2025-05-15T18:00:06.829812774Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:00:06.834179 env[1156]: time="2025-05-15T18:00:06.834112571Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:00:06.839865 env[1156]: time="2025-05-15T18:00:06.839801507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:00:06.843532 env[1156]: time="2025-05-15T18:00:06.843471175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:00:06.845503 env[1156]: time="2025-05-15T18:00:06.845347759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 18:00:06.856543 env[1156]: time="2025-05-15T18:00:06.856413340Z" level=info msg="CreateContainer within sandbox \"fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 18:00:06.907252 env[1156]: time="2025-05-15T18:00:06.907123079Z" level=info msg="CreateContainer within sandbox \"fb75f9e58bfc44ab26e5a9f5222834c33ca8ba788a397079b673d9006203463e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9f9521d6faff16496a81e7cb82d0dc1715787355772d52d485816fa9a8c918e5\"" May 15 18:00:06.909521 env[1156]: time="2025-05-15T18:00:06.909462933Z" level=info msg="StartContainer for \"9f9521d6faff16496a81e7cb82d0dc1715787355772d52d485816fa9a8c918e5\"" May 15 18:00:06.968705 systemd[1]: run-containerd-runc-k8s.io-9f9521d6faff16496a81e7cb82d0dc1715787355772d52d485816fa9a8c918e5-runc.o4t7de.mount: Deactivated successfully. May 15 18:00:06.979208 systemd[1]: Started cri-containerd-9f9521d6faff16496a81e7cb82d0dc1715787355772d52d485816fa9a8c918e5.scope. May 15 18:00:06.999000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.002094 kernel: kauditd_printk_skb: 59 callbacks suppressed May 15 18:00:07.002190 kernel: audit: type=1400 audit(1747332006.999:1355): avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.006760 kernel: audit: type=1300 audit(1747332006.999:1355): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7d48563a68 items=0 ppid=3362 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:00:06.999000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7d48563a68 items=0 ppid=3362 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:00:06.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393532316436666166663136343936613831653763623832643064 May 15 18:00:07.020813 kernel: audit: type=1327 audit(1747332006.999:1355): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393532316436666166663136343936613831653763623832643064 May 15 18:00:07.020903 kernel: audit: type=1400 audit(1747332006.999:1356): avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.030798 kernel: audit: type=1400 audit(1747332006.999:1356): avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.030863 kernel: audit: type=1400 audit(1747332006.999:1356): avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.046196 kernel: audit: type=1400 audit(1747332006.999:1356): avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.046275 kernel: audit: type=1400 audit(1747332006.999:1356): avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.051096 kernel: audit: type=1400 audit(1747332006.999:1356): avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.056190 kernel: audit: type=1400 audit(1747332006.999:1356): avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:06.999000 audit: BPF prog-id=208 op=LOAD May 15 18:00:06.999000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003d20f8 items=0 ppid=3362 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:00:06.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393532316436666166663136343936613831653763623832643064 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.005000 audit: BPF prog-id=209 op=LOAD May 15 18:00:07.005000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003d2148 items=0 ppid=3362 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:00:07.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393532316436666166663136343936613831653763623832643064 May 15 18:00:07.013000 audit: BPF prog-id=209 op=UNLOAD May 15 18:00:07.013000 audit: BPF prog-id=208 op=UNLOAD May 15 18:00:07.013000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:00:07.013000 audit: BPF prog-id=210 op=LOAD May 15 18:00:07.013000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003d21d8 items=0 ppid=3362 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:00:07.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393532316436666166663136343936613831653763623832643064 May 15 18:00:07.066347 env[1156]: time="2025-05-15T18:00:07.066272510Z" level=info msg="StartContainer for \"9f9521d6faff16496a81e7cb82d0dc1715787355772d52d485816fa9a8c918e5\" returns successfully" May 15 18:00:07.167090 kubelet[2041]: I0515 18:00:07.166958 2041 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 18:00:07.168081 kubelet[2041]: I0515 18:00:07.167541 2041 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 18:00:14.577540 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.sJ4q77.mount: Deactivated successfully. May 15 18:00:14.688787 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.0auWgt.mount: Deactivated successfully. May 15 18:00:14.694040 kubelet[2041]: I0515 18:00:14.692516 2041 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-2cnjs" podStartSLOduration=40.509927834 podStartE2EDuration="1m1.692473528s" podCreationTimestamp="2025-05-15 17:59:13 +0000 UTC" firstStartedPulling="2025-05-15 17:59:45.666892291 +0000 UTC m=+53.881430713" lastFinishedPulling="2025-05-15 18:00:06.849437935 +0000 UTC m=+75.063976407" observedRunningTime="2025-05-15 18:00:07.490319735 +0000 UTC m=+75.704858227" watchObservedRunningTime="2025-05-15 18:00:14.692473528 +0000 UTC m=+82.907011950" May 15 18:00:31.655369 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.yjIcpp.mount: Deactivated successfully. May 15 18:00:44.629281 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.jrVfqB.mount: Deactivated successfully. May 15 18:00:48.251000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.253909 kernel: kauditd_printk_skb: 33 callbacks suppressed May 15 18:00:48.254230 kernel: audit: type=1400 audit(1747332048.251:1361): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.271852 kernel: audit: type=1400 audit(1747332048.251:1362): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.251000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.251000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00d5a0d60 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.305193 kernel: audit: type=1300 audit(1747332048.251:1362): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00d5a0d60 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.305392 kernel: audit: type=1327 audit(1747332048.251:1362): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.251000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.252000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.332612 kernel: audit: type=1400 audit(1747332048.252:1363): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.332884 kernel: audit: type=1300 audit(1747332048.252:1363): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00d69bc80 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.252000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00d69bc80 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.346479 kernel: audit: type=1327 audit(1747332048.252:1363): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.346859 kernel: audit: type=1300 audit(1747332048.251:1361): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d222d20 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.251000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d222d20 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.354009 kernel: audit: type=1327 audit(1747332048.251:1361): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.251000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.360483 kernel: audit: type=1400 audit(1747332048.266:1364): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.266000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.266000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00a927ec0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.266000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.271000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.271000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d69bdd0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.271000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.276000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.276000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d222de0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:00:48.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:00:48.339000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.339000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023ca390 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:00:48.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:00:48.339000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:00:48.339000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0020fae60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:00:48.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:00:53.337002 env[1156]: time="2025-05-15T18:00:53.336807634Z" level=info msg="StopPodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\"" May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.417 [WARNING][4731] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0", GenerateName:"calico-apiserver-667fcfb984-", Namespace:"calico-apiserver", SelfLink:"", UID:"bbc51e4d-e705-4cb0-b394-204802a51d29", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"667fcfb984", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5", Pod:"calico-apiserver-667fcfb984-4gvrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif1f289940e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.417 [INFO][4731] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.417 [INFO][4731] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" iface="eth0" netns="" May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.417 [INFO][4731] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.417 [INFO][4731] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.490 [INFO][4738] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.490 [INFO][4738] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.490 [INFO][4738] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.503 [WARNING][4738] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.503 [INFO][4738] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.507 [INFO][4738] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:00:53.513027 env[1156]: 2025-05-15 18:00:53.510 [INFO][4731] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 18:00:53.515064 env[1156]: time="2025-05-15T18:00:53.514895463Z" level=info msg="TearDown network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\" successfully" May 15 18:00:53.515291 env[1156]: time="2025-05-15T18:00:53.515239047Z" level=info msg="StopPodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\" returns successfully" May 15 18:00:53.516516 env[1156]: time="2025-05-15T18:00:53.516443894Z" level=info msg="RemovePodSandbox for \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\"" May 15 18:00:53.517223 env[1156]: time="2025-05-15T18:00:53.516982951Z" level=info msg="Forcibly stopping sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\"" May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.603 [WARNING][4758] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0", GenerateName:"calico-apiserver-667fcfb984-", Namespace:"calico-apiserver", SelfLink:"", UID:"bbc51e4d-e705-4cb0-b394-204802a51d29", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 59, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"667fcfb984", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-100-3e5a09d652.novalocal", ContainerID:"808edc672517924aebb983803f6f808b1265c9cddd07a964afbddc0187da39a5", Pod:"calico-apiserver-667fcfb984-4gvrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif1f289940e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.604 [INFO][4758] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.604 [INFO][4758] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" iface="eth0" netns="" May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.604 [INFO][4758] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.604 [INFO][4758] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.649 [INFO][4765] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.649 [INFO][4765] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.649 [INFO][4765] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.657 [WARNING][4765] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.657 [INFO][4765] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" HandleID="k8s-pod-network.40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" Workload="ci--3510--3--100--3e5a09d652.novalocal-k8s-calico--apiserver--667fcfb984--4gvrr-eth0" May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.659 [INFO][4765] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:00:53.662376 env[1156]: 2025-05-15 18:00:53.661 [INFO][4758] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956" May 15 18:00:53.663643 env[1156]: time="2025-05-15T18:00:53.663534802Z" level=info msg="TearDown network for sandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\" successfully" May 15 18:00:53.678676 env[1156]: time="2025-05-15T18:00:53.678609449Z" level=info msg="RemovePodSandbox \"40938d66beefa27dc5eeee060912c699a2fac560a3d223019abe0706bbe17956\" returns successfully" May 15 18:00:56.110000 audit[4291]: AVC avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:00:56.115366 kernel: kauditd_printk_skb: 14 callbacks suppressed May 15 18:00:56.115545 kernel: audit: type=1400 audit(1747332056.110:1369): avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:00:56.110000 audit[4291]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cb3800 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:00:56.151324 kernel: audit: type=1300 audit(1747332056.110:1369): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cb3800 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:00:56.151500 kernel: audit: type=1327 audit(1747332056.110:1369): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:00:56.110000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:00:59.035000 audit[4435]: AVC avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:00:59.053812 kernel: audit: type=1400 audit(1747332059.035:1370): avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:00:59.035000 audit[4435]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00085c3a0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:00:59.035000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:00:59.089795 kernel: audit: type=1300 audit(1747332059.035:1370): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00085c3a0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:00:59.090009 kernel: audit: type=1327 audit(1747332059.035:1370): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:01:02.563000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:02.563000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:02.593611 kernel: audit: type=1400 audit(1747332062.563:1371): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:02.593960 kernel: audit: type=1400 audit(1747332062.563:1372): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:02.594079 kernel: audit: type=1300 audit(1747332062.563:1372): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002645b20 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:02.563000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002645b20 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:02.621856 kernel: audit: type=1327 audit(1747332062.563:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:02.563000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:02.567000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:02.648233 kernel: audit: type=1400 audit(1747332062.567:1373): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:02.648394 kernel: audit: type=1300 audit(1747332062.567:1373): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002645e40 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:02.567000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002645e40 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:02.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:02.662806 kernel: audit: type=1327 audit(1747332062.567:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:02.662979 kernel: audit: type=1400 audit(1747332062.567:1374): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:02.567000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:02.567000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002645e60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:02.677157 kernel: audit: type=1300 audit(1747332062.567:1374): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002645e60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:02.677573 kernel: audit: type=1327 audit(1747332062.567:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:02.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:02.563000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025ba920 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:02.563000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:14.619955 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.aZTgbn.mount: Deactivated successfully. May 15 18:01:31.636930 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.SxcM4u.mount: Deactivated successfully. May 15 18:01:44.626058 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.AOn1HU.mount: Deactivated successfully. May 15 18:01:45.462963 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.sFupYl.mount: Deactivated successfully. May 15 18:01:48.256000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.261088 kernel: kauditd_printk_skb: 2 callbacks suppressed May 15 18:01:48.261635 kernel: audit: type=1400 audit(1747332108.256:1375): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.256000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.256000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01201d4a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.316833 kernel: audit: type=1400 audit(1747332108.256:1376): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.317041 kernel: audit: type=1300 audit(1747332108.256:1376): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01201d4a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.317140 kernel: audit: type=1327 audit(1747332108.256:1376): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.259000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.341108 kernel: audit: type=1400 audit(1747332108.259:1377): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.341351 kernel: audit: type=1300 audit(1747332108.259:1377): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01201d5f0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.259000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01201d5f0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.259000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.355154 kernel: audit: type=1327 audit(1747332108.259:1377): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.355346 kernel: audit: type=1300 audit(1747332108.256:1375): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c012100920 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.256000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c012100920 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.369107 kernel: audit: type=1327 audit(1747332108.256:1375): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.369345 kernel: audit: type=1400 audit(1747332108.277:1378): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.277000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.277000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c012100940 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.277000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.278000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.278000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011ffc540 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.278000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.278000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.278000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011ffc570 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:01:48.278000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:01:48.342000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.342000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024a2bd0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:48.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:48.344000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:01:48.344000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c786c0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:01:48.344000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:01:56.115000 audit[4291]: AVC avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:01:56.119381 kernel: kauditd_printk_skb: 14 callbacks suppressed May 15 18:01:56.119597 kernel: audit: type=1400 audit(1747332116.115:1383): avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:01:56.115000 audit[4291]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010a07a0 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:01:56.115000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:01:56.171275 kernel: audit: type=1300 audit(1747332116.115:1383): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010a07a0 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:01:56.171640 kernel: audit: type=1327 audit(1747332116.115:1383): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:01:59.039000 audit[4435]: AVC avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:01:59.039000 audit[4435]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b523c0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:01:59.076219 kernel: audit: type=1400 audit(1747332119.039:1384): avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:01:59.076414 kernel: audit: type=1300 audit(1747332119.039:1384): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b523c0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:01:59.076573 kernel: audit: type=1327 audit(1747332119.039:1384): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:01:59.039000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:02:01.612364 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.uMq4ch.mount: Deactivated successfully. May 15 18:02:02.567000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:02.582563 kernel: audit: type=1400 audit(1747332122.567:1385): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:02.582811 kernel: audit: type=1300 audit(1747332122.567:1385): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025192e0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:02.567000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025192e0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:02.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:02.616298 kernel: audit: type=1327 audit(1747332122.567:1385): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:02.616483 kernel: audit: type=1400 audit(1747332122.569:1386): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:02.569000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:02.569000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025194a0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:02.648450 kernel: audit: type=1300 audit(1747332122.569:1386): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025194a0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:02.648607 kernel: audit: type=1327 audit(1747332122.569:1386): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:02.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:02.656135 kernel: audit: type=1400 audit(1747332122.569:1387): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:02.569000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:02.661807 kernel: audit: type=1300 audit(1747332122.569:1387): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025194c0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:02.569000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025194c0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:02.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:02.675708 kernel: audit: type=1327 audit(1747332122.569:1387): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:02.675908 kernel: audit: type=1400 audit(1747332122.570:1388): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:02.570000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:02.570000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c78f60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:02.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:14.603302 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.b56OTN.mount: Deactivated successfully. May 15 18:02:31.660862 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.SkcTzz.mount: Deactivated successfully. May 15 18:02:44.638138 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.bzXMgt.mount: Deactivated successfully. May 15 18:02:48.258000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.263473 kernel: kauditd_printk_skb: 2 callbacks suppressed May 15 18:02:48.263910 kernel: audit: type=1400 audit(1747332168.258:1389): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.258000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006c853b0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.295564 kernel: audit: type=1300 audit(1747332168.258:1389): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006c853b0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.295840 kernel: audit: type=1327 audit(1747332168.258:1389): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.258000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.259000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.325903 kernel: audit: type=1400 audit(1747332168.259:1390): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.326083 kernel: audit: type=1300 audit(1747332168.259:1390): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006c853e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.259000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006c853e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.259000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.348124 kernel: audit: type=1327 audit(1747332168.259:1390): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.348377 kernel: audit: type=1400 audit(1747332168.262:1391): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.262000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.262000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00a74fe80 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.361485 kernel: audit: type=1300 audit(1747332168.262:1391): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00a74fe80 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.361689 kernel: audit: type=1327 audit(1747332168.262:1391): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.262000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.276000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.373821 kernel: audit: type=1400 audit(1747332168.276:1392): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.276000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00ef7f0a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.276000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.276000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006491320 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.276000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.276000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006491350 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:02:48.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:02:48.340000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.340000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00296e120 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:48.340000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:48.346000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:02:48.346000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000dbb7e0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:02:48.346000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:02:56.118000 audit[4291]: AVC avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:02:56.130696 kernel: kauditd_printk_skb: 14 callbacks suppressed May 15 18:02:56.132066 kernel: audit: type=1400 audit(1747332176.118:1397): avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:02:56.118000 audit[4291]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013b8660 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:02:56.118000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:02:56.174640 kernel: audit: type=1300 audit(1747332176.118:1397): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013b8660 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:02:56.174855 kernel: audit: type=1327 audit(1747332176.118:1397): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:02:59.045000 audit[4435]: AVC avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:02:59.064819 kernel: audit: type=1400 audit(1747332179.045:1398): avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:02:59.045000 audit[4435]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b528a0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:02:59.045000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:02:59.104919 kernel: audit: type=1300 audit(1747332179.045:1398): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b528a0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:02:59.105255 kernel: audit: type=1327 audit(1747332179.045:1398): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:03:02.568000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:02.583800 kernel: audit: type=1400 audit(1747332182.568:1399): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:02.584006 kernel: audit: type=1300 audit(1747332182.568:1399): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000294ba0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:02.568000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000294ba0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:02.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:02.618393 kernel: audit: type=1327 audit(1747332182.568:1399): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:02.618871 kernel: audit: type=1400 audit(1747332182.571:1400): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:02.571000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:02.571000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000294c60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:02.648907 kernel: audit: type=1300 audit(1747332182.571:1400): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000294c60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:02.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:02.655977 kernel: audit: type=1327 audit(1747332182.571:1400): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:02.656303 kernel: audit: type=1400 audit(1747332182.571:1401): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:02.571000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:02.571000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000294ce0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:02.670626 kernel: audit: type=1300 audit(1747332182.571:1401): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000294ce0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:02.671030 kernel: audit: type=1327 audit(1747332182.571:1401): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:02.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:02.677810 kernel: audit: type=1400 audit(1747332182.571:1402): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:02.571000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:02.571000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000294d60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:02.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:09.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.23:22-172.24.4.1:56164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:09.446616 kernel: kauditd_printk_skb: 2 callbacks suppressed May 15 18:03:09.447031 kernel: audit: type=1130 audit(1747332189.440:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.23:22-172.24.4.1:56164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:09.441854 systemd[1]: Started sshd@9-172.24.4.23:22-172.24.4.1:56164.service. May 15 18:03:10.769000 audit[5063]: USER_ACCT pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:10.773374 sshd[5063]: Accepted publickey for core from 172.24.4.1 port 56164 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:10.786845 kernel: audit: type=1101 audit(1747332190.769:1404): pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:10.787000 audit[5063]: CRED_ACQ pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:10.805812 kernel: audit: type=1103 audit(1747332190.787:1405): pid=5063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:10.807885 sshd[5063]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:10.787000 audit[5063]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c3eda50 a2=3 a3=0 items=0 ppid=1 pid=5063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:10.834821 kernel: audit: type=1006 audit(1747332190.787:1406): pid=5063 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 18:03:10.835246 kernel: audit: type=1300 audit(1747332190.787:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c3eda50 a2=3 a3=0 items=0 ppid=1 pid=5063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:10.787000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:10.842904 kernel: audit: type=1327 audit(1747332190.787:1406): proctitle=737368643A20636F7265205B707269765D May 15 18:03:10.860107 systemd-logind[1148]: New session 10 of user core. May 15 18:03:10.862240 systemd[1]: Started session-10.scope. May 15 18:03:10.877000 audit[5063]: USER_START pid=5063 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:10.882000 audit[5065]: CRED_ACQ pid=5065 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:10.908056 kernel: audit: type=1105 audit(1747332190.877:1407): pid=5063 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:10.908265 kernel: audit: type=1103 audit(1747332190.882:1408): pid=5065 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:11.620179 sshd[5063]: pam_unix(sshd:session): session closed for user core May 15 18:03:11.621000 audit[5063]: USER_END pid=5063 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:11.627154 systemd[1]: sshd@9-172.24.4.23:22-172.24.4.1:56164.service: Deactivated successfully. May 15 18:03:11.630275 systemd[1]: session-10.scope: Deactivated successfully. May 15 18:03:11.622000 audit[5063]: CRED_DISP pid=5063 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:11.667385 kernel: audit: type=1106 audit(1747332191.621:1409): pid=5063 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:11.667615 kernel: audit: type=1104 audit(1747332191.622:1410): pid=5063 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:11.667712 systemd-logind[1148]: Session 10 logged out. Waiting for processes to exit. May 15 18:03:11.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.23:22-172.24.4.1:56164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:11.670423 systemd-logind[1148]: Removed session 10. May 15 18:03:14.697785 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.kGumu5.mount: Deactivated successfully. May 15 18:03:16.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.23:22-172.24.4.1:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:16.639519 systemd[1]: Started sshd@10-172.24.4.23:22-172.24.4.1:32826.service. May 15 18:03:16.646074 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 18:03:16.646190 kernel: audit: type=1130 audit(1747332196.639:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.23:22-172.24.4.1:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:17.972000 audit[5098]: USER_ACCT pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:17.977380 sshd[5098]: Accepted publickey for core from 172.24.4.1 port 32826 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:17.989803 kernel: audit: type=1101 audit(1747332197.972:1413): pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:17.991162 sshd[5098]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:17.988000 audit[5098]: CRED_ACQ pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:18.009674 systemd[1]: Started session-11.scope. May 15 18:03:18.015149 systemd-logind[1148]: New session 11 of user core. May 15 18:03:18.015974 kernel: audit: type=1103 audit(1747332197.988:1414): pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:17.988000 audit[5098]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeac07e150 a2=3 a3=0 items=0 ppid=1 pid=5098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:18.032807 kernel: audit: type=1006 audit(1747332197.988:1415): pid=5098 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 18:03:18.033041 kernel: audit: type=1300 audit(1747332197.988:1415): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeac07e150 a2=3 a3=0 items=0 ppid=1 pid=5098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.988000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:18.042777 kernel: audit: type=1327 audit(1747332197.988:1415): proctitle=737368643A20636F7265205B707269765D May 15 18:03:18.036000 audit[5098]: USER_START pid=5098 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:18.041000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:18.058807 kernel: audit: type=1105 audit(1747332198.036:1416): pid=5098 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:18.059032 kernel: audit: type=1103 audit(1747332198.041:1417): pid=5100 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:18.955511 sshd[5098]: pam_unix(sshd:session): session closed for user core May 15 18:03:18.961000 audit[5098]: USER_END pid=5098 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:18.971060 systemd-logind[1148]: Session 11 logged out. Waiting for processes to exit. May 15 18:03:18.974885 systemd[1]: sshd@10-172.24.4.23:22-172.24.4.1:32826.service: Deactivated successfully. May 15 18:03:18.976768 systemd[1]: session-11.scope: Deactivated successfully. May 15 18:03:18.979198 systemd-logind[1148]: Removed session 11. May 15 18:03:18.967000 audit[5098]: CRED_DISP pid=5098 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:19.002884 kernel: audit: type=1106 audit(1747332198.961:1418): pid=5098 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:19.003150 kernel: audit: type=1104 audit(1747332198.967:1419): pid=5098 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:18.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.23:22-172.24.4.1:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:23.977956 systemd[1]: Started sshd@11-172.24.4.23:22-172.24.4.1:58970.service. May 15 18:03:23.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.23:22-172.24.4.1:58970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:23.982277 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 18:03:23.982597 kernel: audit: type=1130 audit(1747332203.978:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.23:22-172.24.4.1:58970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:25.428000 audit[5112]: USER_ACCT pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:25.457438 kernel: audit: type=1101 audit(1747332205.428:1422): pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:25.457623 sshd[5112]: Accepted publickey for core from 172.24.4.1 port 58970 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:25.457000 audit[5112]: CRED_ACQ pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:25.459898 sshd[5112]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:25.473783 kernel: audit: type=1103 audit(1747332205.457:1423): pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:25.485794 kernel: audit: type=1006 audit(1747332205.457:1424): pid=5112 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 15 18:03:25.457000 audit[5112]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff734e6b20 a2=3 a3=0 items=0 ppid=1 pid=5112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:25.505967 kernel: audit: type=1300 audit(1747332205.457:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff734e6b20 a2=3 a3=0 items=0 ppid=1 pid=5112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:25.506140 kernel: audit: type=1327 audit(1747332205.457:1424): proctitle=737368643A20636F7265205B707269765D May 15 18:03:25.457000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:25.516458 systemd-logind[1148]: New session 12 of user core. May 15 18:03:25.519719 systemd[1]: Started session-12.scope. May 15 18:03:25.528000 audit[5112]: USER_START pid=5112 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:25.536864 kernel: audit: type=1105 audit(1747332205.528:1425): pid=5112 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:25.532000 audit[5114]: CRED_ACQ pid=5114 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:25.543875 kernel: audit: type=1103 audit(1747332205.532:1426): pid=5114 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:26.254280 sshd[5112]: pam_unix(sshd:session): session closed for user core May 15 18:03:26.256000 audit[5112]: USER_END pid=5112 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:26.275811 kernel: audit: type=1106 audit(1747332206.256:1427): pid=5112 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:26.256000 audit[5112]: CRED_DISP pid=5112 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:26.277801 systemd[1]: sshd@11-172.24.4.23:22-172.24.4.1:58970.service: Deactivated successfully. May 15 18:03:26.281527 systemd[1]: session-12.scope: Deactivated successfully. May 15 18:03:26.290812 kernel: audit: type=1104 audit(1747332206.256:1428): pid=5112 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:26.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.23:22-172.24.4.1:58970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:26.292449 systemd-logind[1148]: Session 12 logged out. Waiting for processes to exit. May 15 18:03:26.295901 systemd-logind[1148]: Removed session 12. May 15 18:03:31.279678 systemd[1]: Started sshd@12-172.24.4.23:22-172.24.4.1:58986.service. May 15 18:03:31.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.23:22-172.24.4.1:58986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:31.285902 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 18:03:31.286313 kernel: audit: type=1130 audit(1747332211.280:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.23:22-172.24.4.1:58986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:32.784657 sshd[5127]: Accepted publickey for core from 172.24.4.1 port 58986 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:32.783000 audit[5127]: USER_ACCT pid=5127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:32.801000 audit[5127]: CRED_ACQ pid=5127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:32.803066 sshd[5127]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:32.818869 kernel: audit: type=1101 audit(1747332212.783:1431): pid=5127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:32.819133 kernel: audit: type=1103 audit(1747332212.801:1432): pid=5127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:32.823343 kernel: audit: type=1006 audit(1747332212.801:1433): pid=5127 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 15 18:03:32.801000 audit[5127]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff91518070 a2=3 a3=0 items=0 ppid=1 pid=5127 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:32.801000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:32.848872 kernel: audit: type=1300 audit(1747332212.801:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff91518070 a2=3 a3=0 items=0 ppid=1 pid=5127 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:32.848979 kernel: audit: type=1327 audit(1747332212.801:1433): proctitle=737368643A20636F7265205B707269765D May 15 18:03:32.853851 systemd-logind[1148]: New session 13 of user core. May 15 18:03:32.854557 systemd[1]: Started session-13.scope. May 15 18:03:32.861000 audit[5127]: USER_START pid=5127 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:32.861000 audit[5149]: CRED_ACQ pid=5149 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:32.875771 kernel: audit: type=1105 audit(1747332212.861:1434): pid=5127 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:32.875918 kernel: audit: type=1103 audit(1747332212.861:1435): pid=5149 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:33.512395 sshd[5127]: pam_unix(sshd:session): session closed for user core May 15 18:03:33.515000 audit[5127]: USER_END pid=5127 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:33.517277 systemd[1]: Started sshd@13-172.24.4.23:22-172.24.4.1:54604.service. May 15 18:03:33.525806 kernel: audit: type=1106 audit(1747332213.515:1436): pid=5127 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:33.528422 systemd[1]: sshd@12-172.24.4.23:22-172.24.4.1:58986.service: Deactivated successfully. May 15 18:03:33.529357 systemd[1]: session-13.scope: Deactivated successfully. May 15 18:03:33.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.23:22-172.24.4.1:54604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:33.531510 systemd-logind[1148]: Session 13 logged out. Waiting for processes to exit. May 15 18:03:33.525000 audit[5127]: CRED_DISP pid=5127 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:33.540699 kernel: audit: type=1130 audit(1747332213.525:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.23:22-172.24.4.1:54604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:33.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.23:22-172.24.4.1:58986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:33.540077 systemd-logind[1148]: Removed session 13. May 15 18:03:34.928000 audit[5159]: USER_ACCT pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:34.930605 sshd[5159]: Accepted publickey for core from 172.24.4.1 port 54604 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:34.931000 audit[5159]: CRED_ACQ pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:34.931000 audit[5159]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9b2bb590 a2=3 a3=0 items=0 ppid=1 pid=5159 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:34.931000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:34.933052 sshd[5159]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:34.946183 systemd[1]: Started session-14.scope. May 15 18:03:34.946900 systemd-logind[1148]: New session 14 of user core. May 15 18:03:34.968000 audit[5159]: USER_START pid=5159 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:34.972000 audit[5162]: CRED_ACQ pid=5162 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:35.880067 sshd[5159]: pam_unix(sshd:session): session closed for user core May 15 18:03:35.885000 audit[5159]: USER_END pid=5159 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:35.886000 audit[5159]: CRED_DISP pid=5159 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:35.890556 systemd[1]: Started sshd@14-172.24.4.23:22-172.24.4.1:54608.service. May 15 18:03:35.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.23:22-172.24.4.1:54608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:35.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.23:22-172.24.4.1:54604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:35.892420 systemd[1]: sshd@13-172.24.4.23:22-172.24.4.1:54604.service: Deactivated successfully. May 15 18:03:35.894193 systemd[1]: session-14.scope: Deactivated successfully. May 15 18:03:35.914939 systemd-logind[1148]: Session 14 logged out. Waiting for processes to exit. May 15 18:03:35.918885 systemd-logind[1148]: Removed session 14. May 15 18:03:37.288000 audit[5169]: USER_ACCT pid=5169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:37.292343 sshd[5169]: Accepted publickey for core from 172.24.4.1 port 54608 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:37.293229 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 18:03:37.293399 kernel: audit: type=1101 audit(1747332217.288:1449): pid=5169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:37.302455 sshd[5169]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:37.298000 audit[5169]: CRED_ACQ pid=5169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:37.326891 kernel: audit: type=1103 audit(1747332217.298:1450): pid=5169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:37.323723 systemd[1]: Started session-15.scope. May 15 18:03:37.326077 systemd-logind[1148]: New session 15 of user core. May 15 18:03:37.341813 kernel: audit: type=1006 audit(1747332217.298:1451): pid=5169 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 18:03:37.298000 audit[5169]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcb04ce80 a2=3 a3=0 items=0 ppid=1 pid=5169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:37.363812 kernel: audit: type=1300 audit(1747332217.298:1451): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcb04ce80 a2=3 a3=0 items=0 ppid=1 pid=5169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:37.298000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:37.368851 kernel: audit: type=1327 audit(1747332217.298:1451): proctitle=737368643A20636F7265205B707269765D May 15 18:03:37.368000 audit[5169]: USER_START pid=5169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:37.373000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:37.382823 kernel: audit: type=1105 audit(1747332217.368:1452): pid=5169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:37.382979 kernel: audit: type=1103 audit(1747332217.373:1453): pid=5174 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:38.019489 sshd[5169]: pam_unix(sshd:session): session closed for user core May 15 18:03:38.021000 audit[5169]: USER_END pid=5169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:38.041798 kernel: audit: type=1106 audit(1747332218.021:1454): pid=5169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:38.021000 audit[5169]: CRED_DISP pid=5169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:38.043666 systemd-logind[1148]: Session 15 logged out. Waiting for processes to exit. May 15 18:03:38.048015 systemd[1]: sshd@14-172.24.4.23:22-172.24.4.1:54608.service: Deactivated successfully. May 15 18:03:38.050730 systemd[1]: session-15.scope: Deactivated successfully. May 15 18:03:38.055395 systemd-logind[1148]: Removed session 15. May 15 18:03:38.057058 kernel: audit: type=1104 audit(1747332218.021:1455): pid=5169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:38.057216 kernel: audit: type=1131 audit(1747332218.047:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.23:22-172.24.4.1:54608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:38.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.23:22-172.24.4.1:54608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:43.032416 systemd[1]: Started sshd@15-172.24.4.23:22-172.24.4.1:54618.service. May 15 18:03:43.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.23:22-172.24.4.1:54618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:43.040816 kernel: audit: type=1130 audit(1747332223.033:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.23:22-172.24.4.1:54618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:44.369000 audit[5188]: USER_ACCT pid=5188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:44.373042 sshd[5188]: Accepted publickey for core from 172.24.4.1 port 54618 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:44.382796 kernel: audit: type=1101 audit(1747332224.369:1458): pid=5188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:44.382000 audit[5188]: CRED_ACQ pid=5188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:44.384844 sshd[5188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:44.403125 kernel: audit: type=1103 audit(1747332224.382:1459): pid=5188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:44.403365 kernel: audit: type=1006 audit(1747332224.382:1460): pid=5188 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 18:03:44.403468 kernel: audit: type=1300 audit(1747332224.382:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3d0fbc0 a2=3 a3=0 items=0 ppid=1 pid=5188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.382000 audit[5188]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3d0fbc0 a2=3 a3=0 items=0 ppid=1 pid=5188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.416609 systemd[1]: Started session-16.scope. May 15 18:03:44.382000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:44.418896 systemd-logind[1148]: New session 16 of user core. May 15 18:03:44.423790 kernel: audit: type=1327 audit(1747332224.382:1460): proctitle=737368643A20636F7265205B707269765D May 15 18:03:44.431000 audit[5188]: USER_START pid=5188 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:44.449953 kernel: audit: type=1105 audit(1747332224.431:1461): pid=5188 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:44.448000 audit[5190]: CRED_ACQ pid=5190 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:44.458831 kernel: audit: type=1103 audit(1747332224.448:1462): pid=5190 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:44.638687 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.Mhv0en.mount: Deactivated successfully. May 15 18:03:45.344861 sshd[5188]: pam_unix(sshd:session): session closed for user core May 15 18:03:45.346000 audit[5188]: USER_END pid=5188 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:45.351934 systemd-logind[1148]: Session 16 logged out. Waiting for processes to exit. May 15 18:03:45.355111 systemd[1]: sshd@15-172.24.4.23:22-172.24.4.1:54618.service: Deactivated successfully. May 15 18:03:45.357316 systemd[1]: session-16.scope: Deactivated successfully. May 15 18:03:45.360706 systemd-logind[1148]: Removed session 16. May 15 18:03:45.368172 kernel: audit: type=1106 audit(1747332225.346:1463): pid=5188 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:45.368415 kernel: audit: type=1104 audit(1747332225.347:1464): pid=5188 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:45.347000 audit[5188]: CRED_DISP pid=5188 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:45.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.23:22-172.24.4.1:54618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:45.457284 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.NltzHP.mount: Deactivated successfully. May 15 18:03:48.263000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.267346 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 18:03:48.267586 kernel: audit: type=1400 audit(1747332228.263:1466): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.263000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0107a3dd0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.302804 kernel: audit: type=1300 audit(1747332228.263:1466): arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0107a3dd0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.320819 kernel: audit: type=1327 audit(1747332228.263:1466): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.266000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.345924 kernel: audit: type=1400 audit(1747332228.266:1467): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.266000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c010ffa7a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.364822 kernel: audit: type=1300 audit(1747332228.266:1467): arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c010ffa7a0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.266000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.267000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.380272 kernel: audit: type=1327 audit(1747332228.266:1467): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.380565 kernel: audit: type=1400 audit(1747332228.267:1468): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.380726 kernel: audit: type=1300 audit(1747332228.267:1468): arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c010824c90 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.267000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c010824c90 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.267000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.395012 kernel: audit: type=1327 audit(1747332228.267:1468): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.395183 kernel: audit: type=1400 audit(1747332228.282:1469): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.282000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.282000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.282000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010ffa960 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.282000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.283000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.283000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010a9a030 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.283000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.282000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0107a3fb0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:03:48.282000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:03:48.349000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.349000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025194e0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:48.349000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:48.365000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:03:48.365000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025fc450 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:03:48.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:03:50.368397 systemd[1]: Started sshd@16-172.24.4.23:22-172.24.4.1:48272.service. May 15 18:03:50.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.23:22-172.24.4.1:48272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:51.824000 audit[5262]: USER_ACCT pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:51.825957 sshd[5262]: Accepted publickey for core from 172.24.4.1 port 48272 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:51.828000 audit[5262]: CRED_ACQ pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:51.828000 audit[5262]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc8929f90 a2=3 a3=0 items=0 ppid=1 pid=5262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:51.828000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:51.830309 sshd[5262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:51.844591 systemd[1]: Started session-17.scope. May 15 18:03:51.848394 systemd-logind[1148]: New session 17 of user core. May 15 18:03:51.865000 audit[5262]: USER_START pid=5262 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:51.869000 audit[5264]: CRED_ACQ pid=5264 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:52.545870 sshd[5262]: pam_unix(sshd:session): session closed for user core May 15 18:03:52.547000 audit[5262]: USER_END pid=5262 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:52.547000 audit[5262]: CRED_DISP pid=5262 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:52.551309 systemd-logind[1148]: Session 17 logged out. Waiting for processes to exit. May 15 18:03:52.551462 systemd[1]: sshd@16-172.24.4.23:22-172.24.4.1:48272.service: Deactivated successfully. May 15 18:03:52.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.23:22-172.24.4.1:48272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:52.552881 systemd[1]: session-17.scope: Deactivated successfully. May 15 18:03:52.554292 systemd-logind[1148]: Removed session 17. May 15 18:03:56.121000 audit[4291]: AVC avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:03:56.126580 kernel: kauditd_printk_skb: 25 callbacks suppressed May 15 18:03:56.127120 kernel: audit: type=1400 audit(1747332236.121:1483): avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:03:56.121000 audit[4291]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013b9800 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:03:56.163811 kernel: audit: type=1300 audit(1747332236.121:1483): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013b9800 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:03:56.164022 kernel: audit: type=1327 audit(1747332236.121:1483): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:03:56.121000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:03:57.570504 systemd[1]: Started sshd@17-172.24.4.23:22-172.24.4.1:51298.service. May 15 18:03:57.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.23:22-172.24.4.1:51298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:57.586829 kernel: audit: type=1130 audit(1747332237.571:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.23:22-172.24.4.1:51298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:58.956000 audit[5276]: USER_ACCT pid=5276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:58.971070 sshd[5276]: Accepted publickey for core from 172.24.4.1 port 51298 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:03:58.975871 kernel: audit: type=1101 audit(1747332238.956:1485): pid=5276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:58.977647 sshd[5276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:03:58.974000 audit[5276]: CRED_ACQ pid=5276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:58.994044 kernel: audit: type=1103 audit(1747332238.974:1486): pid=5276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:58.994459 kernel: audit: type=1006 audit(1747332238.974:1487): pid=5276 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 18:03:58.974000 audit[5276]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf10068c0 a2=3 a3=0 items=0 ppid=1 pid=5276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:59.018644 kernel: audit: type=1300 audit(1747332238.974:1487): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf10068c0 a2=3 a3=0 items=0 ppid=1 pid=5276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:59.018350 systemd-logind[1148]: New session 18 of user core. May 15 18:03:59.027046 kernel: audit: type=1327 audit(1747332238.974:1487): proctitle=737368643A20636F7265205B707269765D May 15 18:03:58.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:03:59.022537 systemd[1]: Started session-18.scope. May 15 18:03:59.033000 audit[5276]: USER_START pid=5276 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:59.043416 kernel: audit: type=1105 audit(1747332239.033:1488): pid=5276 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:59.041000 audit[5278]: CRED_ACQ pid=5278 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:59.049000 audit[4435]: AVC avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:03:59.049000 audit[4435]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b529c0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:03:59.049000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:03:59.642404 sshd[5276]: pam_unix(sshd:session): session closed for user core May 15 18:03:59.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.23:22-172.24.4.1:51304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:59.646375 systemd[1]: Started sshd@18-172.24.4.23:22-172.24.4.1:51304.service. May 15 18:03:59.649000 audit[5276]: USER_END pid=5276 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:59.649000 audit[5276]: CRED_DISP pid=5276 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:59.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.23:22-172.24.4.1:51298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:59.654400 systemd[1]: sshd@17-172.24.4.23:22-172.24.4.1:51298.service: Deactivated successfully. May 15 18:03:59.656360 systemd[1]: session-18.scope: Deactivated successfully. May 15 18:03:59.659363 systemd-logind[1148]: Session 18 logged out. Waiting for processes to exit. May 15 18:03:59.661198 systemd-logind[1148]: Removed session 18. May 15 18:04:00.742000 audit[5287]: USER_ACCT pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:00.744925 sshd[5287]: Accepted publickey for core from 172.24.4.1 port 51304 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:00.745000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:00.746000 audit[5287]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff05deb030 a2=3 a3=0 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:00.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:00.749789 sshd[5287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:00.761191 systemd-logind[1148]: New session 19 of user core. May 15 18:04:00.762309 systemd[1]: Started session-19.scope. May 15 18:04:00.775000 audit[5287]: USER_START pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:00.779000 audit[5290]: CRED_ACQ pid=5290 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:01.592703 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.70TkBP.mount: Deactivated successfully. May 15 18:04:01.875152 sshd[5287]: pam_unix(sshd:session): session closed for user core May 15 18:04:01.877000 audit[5287]: USER_END pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:01.885797 kernel: kauditd_printk_skb: 15 callbacks suppressed May 15 18:04:01.886009 kernel: audit: type=1106 audit(1747332241.877:1500): pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:01.909684 systemd[1]: Started sshd@19-172.24.4.23:22-172.24.4.1:51318.service. May 15 18:04:01.917707 systemd[1]: sshd@18-172.24.4.23:22-172.24.4.1:51304.service: Deactivated successfully. May 15 18:04:01.878000 audit[5287]: CRED_DISP pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:01.924172 systemd[1]: session-19.scope: Deactivated successfully. May 15 18:04:01.929581 systemd-logind[1148]: Session 19 logged out. Waiting for processes to exit. May 15 18:04:01.933704 systemd-logind[1148]: Removed session 19. May 15 18:04:01.936921 kernel: audit: type=1104 audit(1747332241.878:1501): pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:01.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.23:22-172.24.4.1:51318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:01.947790 kernel: audit: type=1130 audit(1747332241.910:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.23:22-172.24.4.1:51318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:01.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.23:22-172.24.4.1:51304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:01.956828 kernel: audit: type=1131 audit(1747332241.917:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.23:22-172.24.4.1:51304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:02.570000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:02.586812 kernel: audit: type=1400 audit(1747332242.570:1504): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:02.570000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268fb40 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:04:02.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:04:02.622796 kernel: audit: type=1300 audit(1747332242.570:1504): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268fb40 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:04:02.623028 kernel: audit: type=1327 audit(1747332242.570:1504): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:04:02.623110 kernel: audit: type=1400 audit(1747332242.572:1505): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:02.572000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:02.572000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268fb60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:04:02.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:04:02.656863 kernel: audit: type=1300 audit(1747332242.572:1505): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268fb60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:04:02.657150 kernel: audit: type=1327 audit(1747332242.572:1505): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:04:02.575000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:02.575000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268fd00 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:04:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:04:02.575000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:02.575000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268fd20 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:04:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:04:03.367000 audit[5316]: USER_ACCT pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:03.371248 sshd[5316]: Accepted publickey for core from 172.24.4.1 port 51318 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:03.370000 audit[5316]: CRED_ACQ pid=5316 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:03.371000 audit[5316]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff85248aa0 a2=3 a3=0 items=0 ppid=1 pid=5316 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:03.371000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:03.374267 sshd[5316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:03.386644 systemd-logind[1148]: New session 20 of user core. May 15 18:04:03.387389 systemd[1]: Started session-20.scope. May 15 18:04:03.419000 audit[5316]: USER_START pid=5316 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:03.423000 audit[5319]: CRED_ACQ pid=5319 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:06.997000 audit[5329]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=5329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.001632 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 18:04:07.001844 kernel: audit: type=1325 audit(1747332246.997:1513): table=filter:119 family=2 entries=20 op=nft_register_rule pid=5329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:06.997000 audit[5329]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd9f6ea410 a2=0 a3=7ffd9f6ea3fc items=0 ppid=2219 pid=5329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.014835 kernel: audit: type=1300 audit(1747332246.997:1513): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd9f6ea410 a2=0 a3=7ffd9f6ea3fc items=0 ppid=2219 pid=5329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.019999 kernel: audit: type=1327 audit(1747332246.997:1513): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:06.997000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.020000 audit[5329]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.026764 kernel: audit: type=1325 audit(1747332247.020:1514): table=nat:120 family=2 entries=22 op=nft_register_rule pid=5329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.026842 kernel: audit: type=1300 audit(1747332247.020:1514): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd9f6ea410 a2=0 a3=0 items=0 ppid=2219 pid=5329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.020000 audit[5329]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd9f6ea410 a2=0 a3=0 items=0 ppid=2219 pid=5329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.038081 kernel: audit: type=1327 audit(1747332247.020:1514): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.053000 audit[5331]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=5331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.059812 kernel: audit: type=1325 audit(1747332247.053:1515): table=filter:121 family=2 entries=32 op=nft_register_rule pid=5331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.053000 audit[5331]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd7fbbeef0 a2=0 a3=7ffd7fbbeedc items=0 ppid=2219 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.084772 kernel: audit: type=1300 audit(1747332247.053:1515): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd7fbbeef0 a2=0 a3=7ffd7fbbeedc items=0 ppid=2219 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.084973 kernel: audit: type=1327 audit(1747332247.053:1515): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.081000 audit[5331]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.090931 kernel: audit: type=1325 audit(1747332247.081:1516): table=nat:122 family=2 entries=22 op=nft_register_rule pid=5331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.081000 audit[5331]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd7fbbeef0 a2=0 a3=0 items=0 ppid=2219 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.286573 sshd[5316]: pam_unix(sshd:session): session closed for user core May 15 18:04:07.286000 audit[5316]: USER_END pid=5316 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:07.286000 audit[5316]: CRED_DISP pid=5316 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:07.294949 systemd[1]: sshd@19-172.24.4.23:22-172.24.4.1:51318.service: Deactivated successfully. May 15 18:04:07.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.23:22-172.24.4.1:51318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:07.297121 systemd[1]: session-20.scope: Deactivated successfully. May 15 18:04:07.297694 systemd[1]: session-20.scope: Consumed 1.101s CPU time. May 15 18:04:07.298899 systemd-logind[1148]: Session 20 logged out. Waiting for processes to exit. May 15 18:04:07.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.23:22-172.24.4.1:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:07.305164 systemd[1]: Started sshd@20-172.24.4.23:22-172.24.4.1:40784.service. May 15 18:04:07.309241 systemd-logind[1148]: Removed session 20. May 15 18:04:08.595000 audit[5335]: USER_ACCT pid=5335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:08.598096 sshd[5335]: Accepted publickey for core from 172.24.4.1 port 40784 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:08.600000 audit[5335]: CRED_ACQ pid=5335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:08.600000 audit[5335]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8a789c60 a2=3 a3=0 items=0 ppid=1 pid=5335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:08.600000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:08.603522 sshd[5335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:08.621134 systemd-logind[1148]: New session 21 of user core. May 15 18:04:08.621369 systemd[1]: Started session-21.scope. May 15 18:04:08.636000 audit[5335]: USER_START pid=5335 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:08.639000 audit[5338]: CRED_ACQ pid=5338 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:09.567278 sshd[5335]: pam_unix(sshd:session): session closed for user core May 15 18:04:09.569000 audit[5335]: USER_END pid=5335 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:09.570000 audit[5335]: CRED_DISP pid=5335 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:09.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.23:22-172.24.4.1:40788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:09.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.23:22-172.24.4.1:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:09.579169 systemd[1]: Started sshd@21-172.24.4.23:22-172.24.4.1:40788.service. May 15 18:04:09.580678 systemd[1]: sshd@20-172.24.4.23:22-172.24.4.1:40784.service: Deactivated successfully. May 15 18:04:09.582576 systemd[1]: session-21.scope: Deactivated successfully. May 15 18:04:09.589912 systemd-logind[1148]: Session 21 logged out. Waiting for processes to exit. May 15 18:04:09.593301 systemd-logind[1148]: Removed session 21. May 15 18:04:10.957000 audit[5345]: USER_ACCT pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:10.962053 sshd[5345]: Accepted publickey for core from 172.24.4.1 port 40788 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:10.964000 audit[5345]: CRED_ACQ pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:10.964000 audit[5345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9bb224e0 a2=3 a3=0 items=0 ppid=1 pid=5345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:10.964000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:10.969333 sshd[5345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:10.989079 systemd-logind[1148]: New session 22 of user core. May 15 18:04:10.992275 systemd[1]: Started session-22.scope. May 15 18:04:11.006000 audit[5345]: USER_START pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:11.011000 audit[5348]: CRED_ACQ pid=5348 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:11.711287 sshd[5345]: pam_unix(sshd:session): session closed for user core May 15 18:04:11.711000 audit[5345]: USER_END pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:11.712000 audit[5345]: CRED_DISP pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:11.717479 systemd[1]: sshd@21-172.24.4.23:22-172.24.4.1:40788.service: Deactivated successfully. May 15 18:04:11.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.23:22-172.24.4.1:40788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:11.718756 systemd[1]: session-22.scope: Deactivated successfully. May 15 18:04:11.719673 systemd-logind[1148]: Session 22 logged out. Waiting for processes to exit. May 15 18:04:11.720621 systemd-logind[1148]: Removed session 22. May 15 18:04:16.510000 audit[5379]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:16.516696 kernel: kauditd_printk_skb: 27 callbacks suppressed May 15 18:04:16.516872 kernel: audit: type=1325 audit(1747332256.510:1538): table=filter:123 family=2 entries=20 op=nft_register_rule pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:16.510000 audit[5379]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdade0a860 a2=0 a3=7ffdade0a84c items=0 ppid=2219 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:16.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:16.550960 kernel: audit: type=1300 audit(1747332256.510:1538): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdade0a860 a2=0 a3=7ffdade0a84c items=0 ppid=2219 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:16.551032 kernel: audit: type=1327 audit(1747332256.510:1538): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:16.553000 audit[5379]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:16.559758 kernel: audit: type=1325 audit(1747332256.553:1539): table=nat:124 family=2 entries=106 op=nft_register_chain pid=5379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:16.559833 kernel: audit: type=1300 audit(1747332256.553:1539): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdade0a860 a2=0 a3=7ffdade0a84c items=0 ppid=2219 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:16.553000 audit[5379]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdade0a860 a2=0 a3=7ffdade0a84c items=0 ppid=2219 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:16.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:16.570930 kernel: audit: type=1327 audit(1747332256.553:1539): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:16.728453 systemd[1]: Started sshd@22-172.24.4.23:22-172.24.4.1:60982.service. May 15 18:04:16.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.23:22-172.24.4.1:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:16.741942 kernel: audit: type=1130 audit(1747332256.729:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.23:22-172.24.4.1:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:18.003000 audit[5382]: USER_ACCT pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:18.004861 sshd[5382]: Accepted publickey for core from 172.24.4.1 port 60982 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:18.010798 kernel: audit: type=1101 audit(1747332258.003:1541): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:18.010000 audit[5382]: CRED_ACQ pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:18.012974 sshd[5382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:18.018089 kernel: audit: type=1103 audit(1747332258.010:1542): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:18.022965 kernel: audit: type=1006 audit(1747332258.011:1543): pid=5382 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 18:04:18.011000 audit[5382]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc97f3ae50 a2=3 a3=0 items=0 ppid=1 pid=5382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:18.011000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:18.030862 systemd[1]: Started session-23.scope. May 15 18:04:18.031803 systemd-logind[1148]: New session 23 of user core. May 15 18:04:18.040000 audit[5382]: USER_START pid=5382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:18.042000 audit[5384]: CRED_ACQ pid=5384 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:18.699209 sshd[5382]: pam_unix(sshd:session): session closed for user core May 15 18:04:18.700000 audit[5382]: USER_END pid=5382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:18.700000 audit[5382]: CRED_DISP pid=5382 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:18.704652 systemd[1]: sshd@22-172.24.4.23:22-172.24.4.1:60982.service: Deactivated successfully. May 15 18:04:18.705516 systemd[1]: session-23.scope: Deactivated successfully. May 15 18:04:18.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.23:22-172.24.4.1:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:18.706773 systemd-logind[1148]: Session 23 logged out. Waiting for processes to exit. May 15 18:04:18.708332 systemd-logind[1148]: Removed session 23. May 15 18:04:23.716353 systemd[1]: Started sshd@23-172.24.4.23:22-172.24.4.1:49978.service. May 15 18:04:23.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.23:22-172.24.4.1:49978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:23.721488 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 18:04:23.721653 kernel: audit: type=1130 audit(1747332263.717:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.23:22-172.24.4.1:49978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:24.983000 audit[5394]: USER_ACCT pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:24.984531 sshd[5394]: Accepted publickey for core from 172.24.4.1 port 49978 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:24.999824 kernel: audit: type=1101 audit(1747332264.983:1550): pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.000703 sshd[5394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:24.998000 audit[5394]: CRED_ACQ pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.013417 systemd[1]: Started session-24.scope. May 15 18:04:25.016289 systemd-logind[1148]: New session 24 of user core. May 15 18:04:25.025092 kernel: audit: type=1103 audit(1747332264.998:1551): pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.025293 kernel: audit: type=1006 audit(1747332264.999:1552): pid=5394 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 18:04:24.999000 audit[5394]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcda233f30 a2=3 a3=0 items=0 ppid=1 pid=5394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:25.040655 kernel: audit: type=1300 audit(1747332264.999:1552): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcda233f30 a2=3 a3=0 items=0 ppid=1 pid=5394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:24.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:25.030000 audit[5394]: USER_START pid=5394 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.060014 kernel: audit: type=1327 audit(1747332264.999:1552): proctitle=737368643A20636F7265205B707269765D May 15 18:04:25.060226 kernel: audit: type=1105 audit(1747332265.030:1553): pid=5394 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.060477 kernel: audit: type=1103 audit(1747332265.035:1554): pid=5396 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.035000 audit[5396]: CRED_ACQ pid=5396 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.715325 sshd[5394]: pam_unix(sshd:session): session closed for user core May 15 18:04:25.717000 audit[5394]: USER_END pid=5394 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.734808 kernel: audit: type=1106 audit(1747332265.717:1555): pid=5394 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.735718 systemd[1]: sshd@23-172.24.4.23:22-172.24.4.1:49978.service: Deactivated successfully. May 15 18:04:25.737561 systemd[1]: session-24.scope: Deactivated successfully. May 15 18:04:25.717000 audit[5394]: CRED_DISP pid=5394 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.754346 systemd-logind[1148]: Session 24 logged out. Waiting for processes to exit. May 15 18:04:25.755090 kernel: audit: type=1104 audit(1747332265.717:1556): pid=5394 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:25.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.23:22-172.24.4.1:49978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:25.758497 systemd-logind[1148]: Removed session 24. May 15 18:04:30.729304 systemd[1]: Started sshd@24-172.24.4.23:22-172.24.4.1:49982.service. May 15 18:04:30.748023 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 18:04:30.748222 kernel: audit: type=1130 audit(1747332270.729:1558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.23:22-172.24.4.1:49982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:30.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.23:22-172.24.4.1:49982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:31.650634 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.lB8jju.mount: Deactivated successfully. May 15 18:04:31.986000 audit[5405]: USER_ACCT pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:31.989008 sshd[5405]: Accepted publickey for core from 172.24.4.1 port 49982 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:31.998800 kernel: audit: type=1101 audit(1747332271.986:1559): pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:31.998000 audit[5405]: CRED_ACQ pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.000160 sshd[5405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:32.010773 kernel: audit: type=1103 audit(1747332271.998:1560): pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:31.998000 audit[5405]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff65e15890 a2=3 a3=0 items=0 ppid=1 pid=5405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:32.030786 kernel: audit: type=1006 audit(1747332271.998:1561): pid=5405 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 15 18:04:32.030913 kernel: audit: type=1300 audit(1747332271.998:1561): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff65e15890 a2=3 a3=0 items=0 ppid=1 pid=5405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:31.998000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:32.037925 kernel: audit: type=1327 audit(1747332271.998:1561): proctitle=737368643A20636F7265205B707269765D May 15 18:04:32.040961 systemd-logind[1148]: New session 25 of user core. May 15 18:04:32.043248 systemd[1]: Started session-25.scope. May 15 18:04:32.052000 audit[5405]: USER_START pid=5405 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.061979 kernel: audit: type=1105 audit(1747332272.052:1562): pid=5405 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.061000 audit[5425]: CRED_ACQ pid=5425 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.072831 kernel: audit: type=1103 audit(1747332272.061:1563): pid=5425 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.902191 sshd[5405]: pam_unix(sshd:session): session closed for user core May 15 18:04:32.906000 audit[5405]: USER_END pid=5405 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.923796 kernel: audit: type=1106 audit(1747332272.906:1564): pid=5405 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.923000 audit[5405]: CRED_DISP pid=5405 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.927614 systemd[1]: sshd@24-172.24.4.23:22-172.24.4.1:49982.service: Deactivated successfully. May 15 18:04:32.929352 systemd[1]: session-25.scope: Deactivated successfully. May 15 18:04:32.939855 kernel: audit: type=1104 audit(1747332272.923:1565): pid=5405 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:32.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.23:22-172.24.4.1:49982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:32.942116 systemd-logind[1148]: Session 25 logged out. Waiting for processes to exit. May 15 18:04:32.944325 systemd-logind[1148]: Removed session 25. May 15 18:04:37.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.23:22-172.24.4.1:35268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:37.915473 systemd[1]: Started sshd@25-172.24.4.23:22-172.24.4.1:35268.service. May 15 18:04:37.928962 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 18:04:37.929185 kernel: audit: type=1130 audit(1747332277.915:1567): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.23:22-172.24.4.1:35268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:39.136000 audit[5453]: USER_ACCT pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.139535 sshd[5453]: Accepted publickey for core from 172.24.4.1 port 35268 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:39.152853 kernel: audit: type=1101 audit(1747332279.136:1568): pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.151000 audit[5453]: CRED_ACQ pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.153997 sshd[5453]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:39.167812 kernel: audit: type=1103 audit(1747332279.151:1569): pid=5453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.188793 kernel: audit: type=1006 audit(1747332279.152:1570): pid=5453 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 15 18:04:39.188968 kernel: audit: type=1300 audit(1747332279.152:1570): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee95adc70 a2=3 a3=0 items=0 ppid=1 pid=5453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:39.152000 audit[5453]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee95adc70 a2=3 a3=0 items=0 ppid=1 pid=5453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:39.152000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:39.203603 kernel: audit: type=1327 audit(1747332279.152:1570): proctitle=737368643A20636F7265205B707269765D May 15 18:04:39.202716 systemd[1]: Started session-26.scope. May 15 18:04:39.204949 systemd-logind[1148]: New session 26 of user core. May 15 18:04:39.219000 audit[5453]: USER_START pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.238005 kernel: audit: type=1105 audit(1747332279.219:1571): pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.238328 kernel: audit: type=1103 audit(1747332279.236:1572): pid=5455 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.236000 audit[5455]: CRED_ACQ pid=5455 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.900385 sshd[5453]: pam_unix(sshd:session): session closed for user core May 15 18:04:39.900000 audit[5453]: USER_END pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.903343 systemd[1]: sshd@25-172.24.4.23:22-172.24.4.1:35268.service: Deactivated successfully. May 15 18:04:39.904139 systemd[1]: session-26.scope: Deactivated successfully. May 15 18:04:39.906118 systemd-logind[1148]: Session 26 logged out. Waiting for processes to exit. May 15 18:04:39.907111 systemd-logind[1148]: Removed session 26. May 15 18:04:39.900000 audit[5453]: CRED_DISP pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.938883 kernel: audit: type=1106 audit(1747332279.900:1573): pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.938937 kernel: audit: type=1104 audit(1747332279.900:1574): pid=5453 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:39.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.23:22-172.24.4.1:35268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:44.635338 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.xbEkji.mount: Deactivated successfully. May 15 18:04:44.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.23:22-172.24.4.1:33236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:44.916921 systemd[1]: Started sshd@26-172.24.4.23:22-172.24.4.1:33236.service. May 15 18:04:44.920691 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 18:04:44.920868 kernel: audit: type=1130 audit(1747332284.916:1576): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.23:22-172.24.4.1:33236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:45.454056 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.TS78GO.mount: Deactivated successfully. May 15 18:04:46.139000 audit[5485]: USER_ACCT pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.142767 sshd[5485]: Accepted publickey for core from 172.24.4.1 port 33236 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:04:46.154000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.156523 sshd[5485]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:04:46.172050 kernel: audit: type=1101 audit(1747332286.139:1577): pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.175687 kernel: audit: type=1103 audit(1747332286.154:1578): pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.175827 kernel: audit: type=1006 audit(1747332286.154:1579): pid=5485 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 15 18:04:46.170093 systemd[1]: Started session-27.scope. May 15 18:04:46.172690 systemd-logind[1148]: New session 27 of user core. May 15 18:04:46.154000 audit[5485]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa1a16650 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:46.198663 kernel: audit: type=1300 audit(1747332286.154:1579): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa1a16650 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:46.154000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:04:46.214654 kernel: audit: type=1327 audit(1747332286.154:1579): proctitle=737368643A20636F7265205B707269765D May 15 18:04:46.182000 audit[5485]: USER_START pid=5485 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.188000 audit[5509]: CRED_ACQ pid=5509 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.228884 kernel: audit: type=1105 audit(1747332286.182:1580): pid=5485 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.229038 kernel: audit: type=1103 audit(1747332286.188:1581): pid=5509 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.898334 sshd[5485]: pam_unix(sshd:session): session closed for user core May 15 18:04:46.901000 audit[5485]: USER_END pid=5485 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.907889 systemd-logind[1148]: Session 27 logged out. Waiting for processes to exit. May 15 18:04:46.901000 audit[5485]: CRED_DISP pid=5485 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.916303 kernel: audit: type=1106 audit(1747332286.901:1582): pid=5485 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.916486 kernel: audit: type=1104 audit(1747332286.901:1583): pid=5485 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:04:46.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.23:22-172.24.4.1:33236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:04:46.911475 systemd[1]: sshd@26-172.24.4.23:22-172.24.4.1:33236.service: Deactivated successfully. May 15 18:04:46.913927 systemd[1]: session-27.scope: Deactivated successfully. May 15 18:04:46.922930 systemd-logind[1148]: Removed session 27. May 15 18:04:48.266000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:48.267000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:48.267000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00de5ed20 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:04:48.267000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:04:48.266000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00cd26420 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:04:48.266000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:04:48.270000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:48.270000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00d625050 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:04:48.270000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:04:48.283000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:48.283000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00e0b0620 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:04:48.283000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:04:48.284000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:48.284000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00d625170 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:04:48.284000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:04:48.289000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:48.289000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00cd265d0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:04:48.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:04:48.352000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:48.352000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a04a20 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:04:48.352000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:04:48.367000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:04:48.367000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001301020 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:04:48.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:04:56.133000 audit[4291]: AVC avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:04:56.137538 kernel: kauditd_printk_skb: 25 callbacks suppressed May 15 18:04:56.137863 kernel: audit: type=1400 audit(1747332296.133:1593): avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:04:56.133000 audit[4291]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010a1260 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:04:56.133000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:04:56.199406 kernel: audit: type=1300 audit(1747332296.133:1593): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010a1260 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:04:56.199665 kernel: audit: type=1327 audit(1747332296.133:1593): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:04:59.052000 audit[4435]: AVC avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:04:59.052000 audit[4435]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b530c0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:04:59.087904 kernel: audit: type=1400 audit(1747332299.052:1594): avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:04:59.088137 kernel: audit: type=1300 audit(1747332299.052:1594): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b530c0 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:04:59.052000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:04:59.103819 kernel: audit: type=1327 audit(1747332299.052:1594): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:05:02.575000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:02.590794 kernel: audit: type=1400 audit(1747332302.575:1595): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:02.577000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:02.577000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002999fc0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:02.623839 kernel: audit: type=1400 audit(1747332302.577:1596): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:02.623999 kernel: audit: type=1300 audit(1747332302.577:1596): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002999fc0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:02.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:02.639697 kernel: audit: type=1327 audit(1747332302.577:1596): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:02.578000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:02.578000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002999fe0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:02.661111 kernel: audit: type=1400 audit(1747332302.578:1597): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:02.661315 kernel: audit: type=1300 audit(1747332302.578:1597): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002999fe0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:02.661408 kernel: audit: type=1327 audit(1747332302.578:1597): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:02.578000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:02.579000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:02.673003 kernel: audit: type=1400 audit(1747332302.579:1598): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:02.673206 kernel: audit: type=1300 audit(1747332302.579:1598): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ad4000 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:02.579000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ad4000 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:02.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:02.686554 kernel: audit: type=1327 audit(1747332302.579:1598): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:02.575000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a05100 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:11.684031 update_engine[1149]: I0515 18:05:11.683722 1149 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 15 18:05:11.684031 update_engine[1149]: I0515 18:05:11.684013 1149 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 15 18:05:11.689523 update_engine[1149]: I0515 18:05:11.689456 1149 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 15 18:05:11.694097 update_engine[1149]: I0515 18:05:11.693284 1149 omaha_request_params.cc:62] Current group set to lts May 15 18:05:11.694862 update_engine[1149]: I0515 18:05:11.694620 1149 update_attempter.cc:499] Already updated boot flags. Skipping. May 15 18:05:11.694862 update_engine[1149]: I0515 18:05:11.694690 1149 update_attempter.cc:643] Scheduling an action processor start. May 15 18:05:11.695278 update_engine[1149]: I0515 18:05:11.694895 1149 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 15 18:05:11.695278 update_engine[1149]: I0515 18:05:11.695079 1149 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 15 18:05:11.695429 update_engine[1149]: I0515 18:05:11.695333 1149 omaha_request_action.cc:270] Posting an Omaha request to disabled May 15 18:05:11.695429 update_engine[1149]: I0515 18:05:11.695353 1149 omaha_request_action.cc:271] Request: May 15 18:05:11.695429 update_engine[1149]: May 15 18:05:11.695429 update_engine[1149]: May 15 18:05:11.695429 update_engine[1149]: May 15 18:05:11.695429 update_engine[1149]: May 15 18:05:11.695429 update_engine[1149]: May 15 18:05:11.695429 update_engine[1149]: May 15 18:05:11.695429 update_engine[1149]: May 15 18:05:11.695429 update_engine[1149]: May 15 18:05:11.695429 update_engine[1149]: I0515 18:05:11.695365 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:11.702081 locksmithd[1193]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 15 18:05:11.708422 update_engine[1149]: I0515 18:05:11.708349 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:11.710122 update_engine[1149]: E0515 18:05:11.710054 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:11.710299 update_engine[1149]: I0515 18:05:11.710255 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 15 18:05:14.644604 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.alQ8hg.mount: Deactivated successfully. May 15 18:05:21.662203 update_engine[1149]: I0515 18:05:21.662087 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:21.663961 update_engine[1149]: I0515 18:05:21.663220 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:21.663961 update_engine[1149]: E0515 18:05:21.663481 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:21.663961 update_engine[1149]: I0515 18:05:21.663801 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 15 18:05:31.671651 update_engine[1149]: I0515 18:05:31.671073 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:31.675198 update_engine[1149]: I0515 18:05:31.672060 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:31.675198 update_engine[1149]: E0515 18:05:31.672346 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:31.675198 update_engine[1149]: I0515 18:05:31.672431 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 15 18:05:41.663439 update_engine[1149]: I0515 18:05:41.663132 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:41.665163 update_engine[1149]: I0515 18:05:41.664366 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:41.665163 update_engine[1149]: E0515 18:05:41.665009 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:41.665524 update_engine[1149]: I0515 18:05:41.665249 1149 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 15 18:05:41.665524 update_engine[1149]: I0515 18:05:41.665292 1149 omaha_request_action.cc:621] Omaha request response: May 15 18:05:41.665985 update_engine[1149]: E0515 18:05:41.665920 1149 omaha_request_action.cc:640] Omaha request network transfer failed. May 15 18:05:41.666161 update_engine[1149]: I0515 18:05:41.666047 1149 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 15 18:05:41.666161 update_engine[1149]: I0515 18:05:41.666060 1149 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 18:05:41.666161 update_engine[1149]: I0515 18:05:41.666069 1149 update_attempter.cc:306] Processing Done. May 15 18:05:41.666599 update_engine[1149]: E0515 18:05:41.666188 1149 update_attempter.cc:619] Update failed. May 15 18:05:41.666599 update_engine[1149]: I0515 18:05:41.666213 1149 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 15 18:05:41.666599 update_engine[1149]: I0515 18:05:41.666222 1149 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 15 18:05:41.666599 update_engine[1149]: I0515 18:05:41.666240 1149 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 15 18:05:41.669000 update_engine[1149]: I0515 18:05:41.667979 1149 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 15 18:05:41.669000 update_engine[1149]: I0515 18:05:41.668208 1149 omaha_request_action.cc:270] Posting an Omaha request to disabled May 15 18:05:41.669000 update_engine[1149]: I0515 18:05:41.668221 1149 omaha_request_action.cc:271] Request: May 15 18:05:41.669000 update_engine[1149]: May 15 18:05:41.669000 update_engine[1149]: May 15 18:05:41.669000 update_engine[1149]: May 15 18:05:41.669000 update_engine[1149]: May 15 18:05:41.669000 update_engine[1149]: May 15 18:05:41.669000 update_engine[1149]: May 15 18:05:41.669000 update_engine[1149]: I0515 18:05:41.668236 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:41.670202 update_engine[1149]: I0515 18:05:41.669845 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:41.670202 update_engine[1149]: E0515 18:05:41.670078 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:41.670511 update_engine[1149]: I0515 18:05:41.670213 1149 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 15 18:05:41.670511 update_engine[1149]: I0515 18:05:41.670238 1149 omaha_request_action.cc:621] Omaha request response: May 15 18:05:41.670511 update_engine[1149]: I0515 18:05:41.670254 1149 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 18:05:41.670511 update_engine[1149]: I0515 18:05:41.670265 1149 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 18:05:41.670511 update_engine[1149]: I0515 18:05:41.670277 1149 update_attempter.cc:306] Processing Done. May 15 18:05:41.670511 update_engine[1149]: I0515 18:05:41.670290 1149 update_attempter.cc:310] Error event sent. May 15 18:05:41.670511 update_engine[1149]: I0515 18:05:41.670382 1149 update_check_scheduler.cc:74] Next update check in 47m3s May 15 18:05:41.675377 locksmithd[1193]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 15 18:05:41.675377 locksmithd[1193]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 15 18:05:48.268000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.273307 kernel: kauditd_printk_skb: 2 callbacks suppressed May 15 18:05:48.273692 kernel: audit: type=1400 audit(1747332348.268:1599): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.268000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.305840 kernel: audit: type=1400 audit(1747332348.268:1600): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.268000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c012c8cb40 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.341385 kernel: audit: type=1300 audit(1747332348.268:1600): arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c012c8cb40 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.341584 kernel: audit: type=1327 audit(1747332348.268:1600): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.341686 kernel: audit: type=1400 audit(1747332348.271:1601): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.271000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.271000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c012c8cbd0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.357337 kernel: audit: type=1300 audit(1747332348.271:1601): arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c012c8cbd0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.357552 kernel: audit: type=1327 audit(1747332348.271:1601): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.271000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.268000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011d7cfc0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.371424 kernel: audit: type=1300 audit(1747332348.268:1599): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011d7cfc0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.378074 kernel: audit: type=1327 audit(1747332348.268:1599): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.378238 kernel: audit: type=1400 audit(1747332348.285:1602): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.285000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.285000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c012c31bc0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.285000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.289000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.289000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011dc2f00 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.290000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.290000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c012c8cd50 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:05:48.290000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:05:48.358000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.358000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002f41920 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:48.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:48.370000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:05:48.370000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c68930 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:05:48.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:05:56.143000 audit[4291]: AVC avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:05:56.165706 kernel: kauditd_printk_skb: 14 callbacks suppressed May 15 18:05:56.165930 kernel: audit: type=1400 audit(1747332356.143:1607): avc: denied { watch } for pid=4291 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.969358631/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c456,c534 tclass=file permissive=0 May 15 18:05:56.166795 kernel: audit: type=1300 audit(1747332356.143:1607): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010a18c0 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:05:56.143000 audit[4291]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010a18c0 a2=fc6 a3=0 items=0 ppid=3443 pid=4291 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c456,c534 key=(null) May 15 18:05:56.143000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:05:56.201881 kernel: audit: type=1327 audit(1747332356.143:1607): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:05:59.057000 audit[4435]: AVC avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:05:59.074824 kernel: audit: type=1400 audit(1747332359.057:1608): avc: denied { watch } for pid=4435 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_17_59_30.4116360062/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c33,c306 tclass=file permissive=0 May 15 18:05:59.057000 audit[4435]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000efff60 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:05:59.057000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:05:59.110123 kernel: audit: type=1300 audit(1747332359.057:1608): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000efff60 a2=fc6 a3=0 items=0 ppid=4380 pid=4435 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c306 key=(null) May 15 18:05:59.110289 kernel: audit: type=1327 audit(1747332359.057:1608): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 18:06:02.579000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:02.579000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:02.607840 kernel: audit: type=1400 audit(1747332362.579:1609): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:02.608114 kernel: audit: type=1400 audit(1747332362.579:1610): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:02.608330 kernel: audit: type=1300 audit(1747332362.579:1610): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e738e0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:02.579000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e738e0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:02.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:06:02.641782 kernel: audit: type=1327 audit(1747332362.579:1610): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:06:02.579000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:02.654128 kernel: audit: type=1400 audit(1747332362.579:1611): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:02.654402 kernel: audit: type=1300 audit(1747332362.579:1611): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e73a80 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:02.579000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e73a80 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:02.661719 kernel: audit: type=1327 audit(1747332362.579:1611): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:06:02.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:06:02.579000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:02.677416 kernel: audit: type=1400 audit(1747332362.579:1612): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:02.677577 kernel: audit: type=1300 audit(1747332362.579:1612): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e73aa0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:02.579000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e73aa0 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:02.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:06:02.691095 kernel: audit: type=1327 audit(1747332362.579:1612): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:06:02.579000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0020fab40 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:02.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:06:44.627658 systemd[1]: run-containerd-runc-k8s.io-e59b91daf1bfcdb0ae4b0e8e0086e013646301e80afeddc8d61d7aac1d191b72-runc.iq390e.mount: Deactivated successfully. May 15 18:06:45.447514 systemd[1]: run-containerd-runc-k8s.io-e12873c376f9bac99029e926f75d0ca202c4c5875a3bbf09ef74760deb208e77-runc.XpcTP4.mount: Deactivated successfully. May 15 18:06:48.271000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.277878 kernel: kauditd_printk_skb: 2 callbacks suppressed May 15 18:06:48.278253 kernel: audit: type=1400 audit(1747332408.271:1613): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.271000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00b22e540 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.311005 kernel: audit: type=1300 audit(1747332408.271:1613): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00b22e540 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.311255 kernel: audit: type=1327 audit(1747332408.271:1613): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.271000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.276000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.341265 kernel: audit: type=1400 audit(1747332408.276:1614): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.276000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c003fbf620 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.353776 kernel: audit: type=1300 audit(1747332408.276:1614): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c003fbf620 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.353969 kernel: audit: type=1327 audit(1747332408.276:1614): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.277000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.366623 kernel: audit: type=1400 audit(1747332408.277:1615): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.277000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00b22eab0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.277000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.381388 kernel: audit: type=1300 audit(1747332408.277:1615): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00b22eab0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.381615 kernel: audit: type=1327 audit(1747332408.277:1615): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.381823 kernel: audit: type=1400 audit(1747332408.287:1616): avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.287000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.287000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0055181e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.287000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.289000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.289000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00471d1e0 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.295000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.295000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c005518270 a2=fc6 a3=0 items=0 ppid=1737 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c728 key=(null) May 15 18:06:48.295000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3233002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 15 18:06:48.365000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.365000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028d3180 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:48.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 18:06:48.371000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 18:06:48.371000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025fcf60 a2=fc6 a3=0 items=0 ppid=1788 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c309,c689 key=(null) May 15 18:06:48.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269