May 17 00:53:41.680348 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:53:41.680363 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:53:41.680369 kernel: Disabled fast string operations May 17 00:53:41.680374 kernel: BIOS-provided physical RAM map: May 17 00:53:41.680377 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable May 17 00:53:41.680381 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved May 17 00:53:41.680387 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved May 17 00:53:41.680391 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable May 17 00:53:41.680395 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data May 17 00:53:41.680399 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS May 17 00:53:41.680403 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable May 17 00:53:41.680407 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved May 17 00:53:41.680411 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved May 17 00:53:41.680416 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 17 00:53:41.680425 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved May 17 00:53:41.680432 kernel: NX (Execute Disable) protection: active May 17 00:53:41.680440 kernel: SMBIOS 2.7 present. May 17 00:53:41.680445 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 May 17 00:53:41.680449 kernel: vmware: hypercall mode: 0x00 May 17 00:53:41.680454 kernel: Hypervisor detected: VMware May 17 00:53:41.680459 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz May 17 00:53:41.680464 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz May 17 00:53:41.680468 kernel: vmware: using clock offset of 5771985432 ns May 17 00:53:41.680473 kernel: tsc: Detected 3408.000 MHz processor May 17 00:53:41.680477 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:53:41.680482 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:53:41.680487 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 May 17 00:53:41.680492 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:53:41.680496 kernel: total RAM covered: 3072M May 17 00:53:41.680501 kernel: Found optimal setting for mtrr clean up May 17 00:53:41.680507 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G May 17 00:53:41.680511 kernel: Using GB pages for direct mapping May 17 00:53:41.680516 kernel: ACPI: Early table checksum verification disabled May 17 00:53:41.680520 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) May 17 00:53:41.680525 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) May 17 00:53:41.680529 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) May 17 00:53:41.680534 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) May 17 00:53:41.680538 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 17 00:53:41.680543 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 17 00:53:41.680548 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) May 17 00:53:41.680555 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) May 17 00:53:41.680560 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) May 17 00:53:41.680565 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) May 17 00:53:41.680570 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) May 17 00:53:41.680576 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) May 17 00:53:41.680581 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] May 17 00:53:41.680585 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] May 17 00:53:41.680590 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 17 00:53:41.680595 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 17 00:53:41.680600 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] May 17 00:53:41.680605 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] May 17 00:53:41.680610 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] May 17 00:53:41.680615 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] May 17 00:53:41.680621 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] May 17 00:53:41.680626 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] May 17 00:53:41.680630 kernel: system APIC only can use physical flat May 17 00:53:41.680635 kernel: Setting APIC routing to physical flat. May 17 00:53:41.680640 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:53:41.680645 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 17 00:53:41.680650 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 17 00:53:41.680655 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 17 00:53:41.680659 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 17 00:53:41.680665 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 17 00:53:41.680670 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 17 00:53:41.680675 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 17 00:53:41.680679 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 May 17 00:53:41.680684 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 May 17 00:53:41.680689 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 May 17 00:53:41.680694 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 May 17 00:53:41.680701 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 May 17 00:53:41.680708 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 May 17 00:53:41.680717 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 May 17 00:53:41.680723 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 May 17 00:53:41.680728 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 May 17 00:53:41.680733 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 May 17 00:53:41.680749 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 May 17 00:53:41.680754 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 May 17 00:53:41.680759 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 May 17 00:53:41.680764 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 May 17 00:53:41.680769 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 May 17 00:53:41.680773 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 May 17 00:53:41.680778 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 May 17 00:53:41.680785 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 May 17 00:53:41.680789 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 May 17 00:53:41.680794 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 May 17 00:53:41.680799 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 May 17 00:53:41.680804 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 May 17 00:53:41.680809 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 May 17 00:53:41.680814 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 May 17 00:53:41.680818 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 May 17 00:53:41.680823 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 May 17 00:53:41.680828 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 May 17 00:53:41.680834 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 May 17 00:53:41.680839 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 May 17 00:53:41.680843 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 May 17 00:53:41.680848 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 May 17 00:53:41.680853 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 May 17 00:53:41.680858 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 May 17 00:53:41.680862 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 May 17 00:53:41.680867 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 May 17 00:53:41.680872 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 May 17 00:53:41.680877 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 May 17 00:53:41.680883 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 May 17 00:53:41.680888 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 May 17 00:53:41.680892 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 May 17 00:53:41.680897 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 May 17 00:53:41.680902 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 May 17 00:53:41.680907 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 May 17 00:53:41.680912 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 May 17 00:53:41.680916 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 May 17 00:53:41.680921 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 May 17 00:53:41.680927 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 May 17 00:53:41.680932 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 May 17 00:53:41.680937 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 May 17 00:53:41.680941 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 May 17 00:53:41.680946 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 May 17 00:53:41.680951 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 May 17 00:53:41.680957 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 May 17 00:53:41.680965 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 May 17 00:53:41.680971 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 May 17 00:53:41.680976 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 May 17 00:53:41.680981 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 May 17 00:53:41.680987 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 May 17 00:53:41.680993 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 May 17 00:53:41.680998 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 May 17 00:53:41.681003 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 May 17 00:53:41.681008 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 May 17 00:53:41.681014 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 May 17 00:53:41.681019 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 May 17 00:53:41.681024 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 May 17 00:53:41.681030 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 May 17 00:53:41.681035 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 May 17 00:53:41.681041 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 May 17 00:53:41.681046 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 May 17 00:53:41.681051 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 May 17 00:53:41.681056 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 May 17 00:53:41.681062 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 May 17 00:53:41.681067 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 May 17 00:53:41.681072 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 May 17 00:53:41.681078 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 May 17 00:53:41.681083 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 May 17 00:53:41.681089 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 May 17 00:53:41.681094 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 May 17 00:53:41.681099 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 May 17 00:53:41.681104 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 May 17 00:53:41.681109 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 May 17 00:53:41.681114 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 May 17 00:53:41.681119 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 May 17 00:53:41.681125 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 May 17 00:53:41.681131 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 May 17 00:53:41.681136 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 May 17 00:53:41.681141 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 May 17 00:53:41.681146 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 May 17 00:53:41.681152 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 May 17 00:53:41.681157 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 May 17 00:53:41.681162 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 May 17 00:53:41.681167 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 May 17 00:53:41.681180 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 May 17 00:53:41.681186 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 May 17 00:53:41.681193 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 May 17 00:53:41.681198 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 May 17 00:53:41.681203 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 May 17 00:53:41.681209 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 May 17 00:53:41.681214 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 May 17 00:53:41.681219 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 May 17 00:53:41.681224 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 May 17 00:53:41.681229 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 May 17 00:53:41.681234 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 May 17 00:53:41.681240 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 May 17 00:53:41.681246 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 May 17 00:53:41.681251 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 May 17 00:53:41.681256 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 May 17 00:53:41.681262 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 May 17 00:53:41.681267 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 May 17 00:53:41.681272 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 May 17 00:53:41.681277 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 May 17 00:53:41.681282 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 May 17 00:53:41.681287 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 May 17 00:53:41.681293 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 May 17 00:53:41.681299 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 May 17 00:53:41.681304 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 May 17 00:53:41.681309 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 May 17 00:53:41.681314 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 May 17 00:53:41.681320 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 May 17 00:53:41.681325 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 May 17 00:53:41.681333 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:53:41.681339 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 17 00:53:41.681344 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug May 17 00:53:41.681351 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] May 17 00:53:41.681356 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] May 17 00:53:41.681362 kernel: Zone ranges: May 17 00:53:41.681367 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:53:41.681372 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] May 17 00:53:41.681377 kernel: Normal empty May 17 00:53:41.681383 kernel: Movable zone start for each node May 17 00:53:41.681388 kernel: Early memory node ranges May 17 00:53:41.681393 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] May 17 00:53:41.681398 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] May 17 00:53:41.681405 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] May 17 00:53:41.681410 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] May 17 00:53:41.681415 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:53:41.681421 kernel: On node 0, zone DMA: 98 pages in unavailable ranges May 17 00:53:41.681426 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges May 17 00:53:41.681431 kernel: ACPI: PM-Timer IO Port: 0x1008 May 17 00:53:41.681436 kernel: system APIC only can use physical flat May 17 00:53:41.681441 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) May 17 00:53:41.681447 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 17 00:53:41.681453 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 17 00:53:41.681458 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 17 00:53:41.681464 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 17 00:53:41.681469 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 17 00:53:41.681474 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 17 00:53:41.681479 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 17 00:53:41.681484 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 17 00:53:41.681490 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 17 00:53:41.681495 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 17 00:53:41.681500 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 17 00:53:41.681506 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 17 00:53:41.681511 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 17 00:53:41.681517 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 17 00:53:41.681522 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 17 00:53:41.681527 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 17 00:53:41.681532 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) May 17 00:53:41.681537 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) May 17 00:53:41.681543 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) May 17 00:53:41.681548 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) May 17 00:53:41.681554 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) May 17 00:53:41.681559 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) May 17 00:53:41.681565 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) May 17 00:53:41.681570 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) May 17 00:53:41.681575 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) May 17 00:53:41.681580 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) May 17 00:53:41.681585 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) May 17 00:53:41.681591 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) May 17 00:53:41.681596 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) May 17 00:53:41.681602 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) May 17 00:53:41.681607 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) May 17 00:53:41.681613 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) May 17 00:53:41.681618 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) May 17 00:53:41.681623 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) May 17 00:53:41.681628 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) May 17 00:53:41.681634 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) May 17 00:53:41.681639 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) May 17 00:53:41.681644 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) May 17 00:53:41.681649 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) May 17 00:53:41.681655 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) May 17 00:53:41.681660 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) May 17 00:53:41.681666 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) May 17 00:53:41.681671 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) May 17 00:53:41.681676 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) May 17 00:53:41.681682 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) May 17 00:53:41.681687 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) May 17 00:53:41.681692 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) May 17 00:53:41.681697 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) May 17 00:53:41.681702 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) May 17 00:53:41.681709 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) May 17 00:53:41.681714 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) May 17 00:53:41.681719 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) May 17 00:53:41.681724 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) May 17 00:53:41.681730 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) May 17 00:53:41.681735 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) May 17 00:53:41.681740 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) May 17 00:53:41.681745 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) May 17 00:53:41.681750 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) May 17 00:53:41.681757 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) May 17 00:53:41.681762 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) May 17 00:53:41.681767 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) May 17 00:53:41.681772 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) May 17 00:53:41.681777 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) May 17 00:53:41.681782 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) May 17 00:53:41.681788 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) May 17 00:53:41.681793 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) May 17 00:53:41.681798 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) May 17 00:53:41.681805 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) May 17 00:53:41.681810 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) May 17 00:53:41.681815 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) May 17 00:53:41.681820 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) May 17 00:53:41.681825 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) May 17 00:53:41.681831 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) May 17 00:53:41.681836 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) May 17 00:53:41.681841 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) May 17 00:53:41.681846 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) May 17 00:53:41.681851 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) May 17 00:53:41.681857 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) May 17 00:53:41.681863 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) May 17 00:53:41.681868 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) May 17 00:53:41.681873 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) May 17 00:53:41.681878 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) May 17 00:53:41.681883 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) May 17 00:53:41.681889 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) May 17 00:53:41.681894 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) May 17 00:53:41.681899 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) May 17 00:53:41.681905 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) May 17 00:53:41.681911 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) May 17 00:53:41.681916 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) May 17 00:53:41.681921 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) May 17 00:53:41.681926 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) May 17 00:53:41.681932 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) May 17 00:53:41.681937 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) May 17 00:53:41.681942 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) May 17 00:53:41.681947 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) May 17 00:53:41.681952 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) May 17 00:53:41.681959 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) May 17 00:53:41.681964 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) May 17 00:53:41.681969 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) May 17 00:53:41.681974 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) May 17 00:53:41.681979 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) May 17 00:53:41.681985 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) May 17 00:53:41.681990 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) May 17 00:53:41.681995 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) May 17 00:53:41.682000 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) May 17 00:53:41.682006 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) May 17 00:53:41.682012 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) May 17 00:53:41.682017 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) May 17 00:53:41.682022 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) May 17 00:53:41.682027 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) May 17 00:53:41.682033 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) May 17 00:53:41.682038 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) May 17 00:53:41.682043 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) May 17 00:53:41.682048 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) May 17 00:53:41.682055 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) May 17 00:53:41.682060 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) May 17 00:53:41.682065 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) May 17 00:53:41.682070 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) May 17 00:53:41.682075 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) May 17 00:53:41.682081 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) May 17 00:53:41.682086 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) May 17 00:53:41.682091 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) May 17 00:53:41.682096 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) May 17 00:53:41.682103 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) May 17 00:53:41.682108 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) May 17 00:53:41.682113 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) May 17 00:53:41.682118 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) May 17 00:53:41.682123 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 May 17 00:53:41.682129 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) May 17 00:53:41.682134 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:53:41.682139 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 May 17 00:53:41.682144 kernel: TSC deadline timer available May 17 00:53:41.682150 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs May 17 00:53:41.682156 kernel: [mem 0x80000000-0xefffffff] available for PCI devices May 17 00:53:41.682161 kernel: Booting paravirtualized kernel on VMware hypervisor May 17 00:53:41.682167 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:53:41.682179 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 May 17 00:53:41.682186 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 17 00:53:41.682191 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 17 00:53:41.682196 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 May 17 00:53:41.682202 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 May 17 00:53:41.682208 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 May 17 00:53:41.682213 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 May 17 00:53:41.682218 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 May 17 00:53:41.682223 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 May 17 00:53:41.682229 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 May 17 00:53:41.682241 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 May 17 00:53:41.682247 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 May 17 00:53:41.682253 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 May 17 00:53:41.682258 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 May 17 00:53:41.682265 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 May 17 00:53:41.682270 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 May 17 00:53:41.682276 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 May 17 00:53:41.682281 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 May 17 00:53:41.682287 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 May 17 00:53:41.682292 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 May 17 00:53:41.682298 kernel: Policy zone: DMA32 May 17 00:53:41.682304 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:53:41.682311 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:53:41.682316 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes May 17 00:53:41.682322 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes May 17 00:53:41.682330 kernel: printk: log_buf_len min size: 262144 bytes May 17 00:53:41.682336 kernel: printk: log_buf_len: 1048576 bytes May 17 00:53:41.682344 kernel: printk: early log buf free: 239728(91%) May 17 00:53:41.682353 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:53:41.682362 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:53:41.682368 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:53:41.682376 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 155976K reserved, 0K cma-reserved) May 17 00:53:41.682382 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 May 17 00:53:41.682387 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:53:41.682393 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:53:41.682400 kernel: rcu: Hierarchical RCU implementation. May 17 00:53:41.682406 kernel: rcu: RCU event tracing is enabled. May 17 00:53:41.682413 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. May 17 00:53:41.682418 kernel: Rude variant of Tasks RCU enabled. May 17 00:53:41.682424 kernel: Tracing variant of Tasks RCU enabled. May 17 00:53:41.682430 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:53:41.682436 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 May 17 00:53:41.682442 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 May 17 00:53:41.682448 kernel: random: crng init done May 17 00:53:41.682453 kernel: Console: colour VGA+ 80x25 May 17 00:53:41.682459 kernel: printk: console [tty0] enabled May 17 00:53:41.682466 kernel: printk: console [ttyS0] enabled May 17 00:53:41.682471 kernel: ACPI: Core revision 20210730 May 17 00:53:41.682477 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns May 17 00:53:41.682483 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:53:41.682488 kernel: x2apic enabled May 17 00:53:41.682494 kernel: Switched APIC routing to physical x2apic. May 17 00:53:41.682500 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:53:41.682505 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 17 00:53:41.682511 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) May 17 00:53:41.682518 kernel: Disabled fast string operations May 17 00:53:41.682523 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:53:41.682529 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:53:41.682535 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:53:41.682541 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 17 00:53:41.682547 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 17 00:53:41.682553 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 17 00:53:41.682561 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 17 00:53:41.682570 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 17 00:53:41.682578 kernel: RETBleed: Mitigation: Enhanced IBRS May 17 00:53:41.682584 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:53:41.682589 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:53:41.682595 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:53:41.682601 kernel: SRBDS: Unknown: Dependent on hypervisor status May 17 00:53:41.682607 kernel: GDS: Unknown: Dependent on hypervisor status May 17 00:53:41.682612 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:53:41.682618 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:53:41.682624 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:53:41.682630 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:53:41.682636 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. May 17 00:53:41.682641 kernel: Freeing SMP alternatives memory: 32K May 17 00:53:41.682647 kernel: pid_max: default: 131072 minimum: 1024 May 17 00:53:41.682653 kernel: LSM: Security Framework initializing May 17 00:53:41.682658 kernel: SELinux: Initializing. May 17 00:53:41.682664 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:53:41.682670 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:53:41.682677 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 17 00:53:41.682682 kernel: Performance Events: Skylake events, core PMU driver. May 17 00:53:41.682688 kernel: core: CPUID marked event: 'cpu cycles' unavailable May 17 00:53:41.682694 kernel: core: CPUID marked event: 'instructions' unavailable May 17 00:53:41.682699 kernel: core: CPUID marked event: 'bus cycles' unavailable May 17 00:53:41.682705 kernel: core: CPUID marked event: 'cache references' unavailable May 17 00:53:41.682711 kernel: core: CPUID marked event: 'cache misses' unavailable May 17 00:53:41.682716 kernel: core: CPUID marked event: 'branch instructions' unavailable May 17 00:53:41.682722 kernel: core: CPUID marked event: 'branch misses' unavailable May 17 00:53:41.682729 kernel: ... version: 1 May 17 00:53:41.682734 kernel: ... bit width: 48 May 17 00:53:41.682740 kernel: ... generic registers: 4 May 17 00:53:41.682746 kernel: ... value mask: 0000ffffffffffff May 17 00:53:41.682751 kernel: ... max period: 000000007fffffff May 17 00:53:41.682757 kernel: ... fixed-purpose events: 0 May 17 00:53:41.682763 kernel: ... event mask: 000000000000000f May 17 00:53:41.682768 kernel: signal: max sigframe size: 1776 May 17 00:53:41.682774 kernel: rcu: Hierarchical SRCU implementation. May 17 00:53:41.682781 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:53:41.682787 kernel: smp: Bringing up secondary CPUs ... May 17 00:53:41.682793 kernel: x86: Booting SMP configuration: May 17 00:53:41.682799 kernel: .... node #0, CPUs: #1 May 17 00:53:41.682804 kernel: Disabled fast string operations May 17 00:53:41.682810 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 May 17 00:53:41.682815 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 17 00:53:41.682821 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:53:41.682827 kernel: smpboot: Max logical packages: 128 May 17 00:53:41.682832 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) May 17 00:53:41.682839 kernel: devtmpfs: initialized May 17 00:53:41.682845 kernel: x86/mm: Memory block size: 128MB May 17 00:53:41.682851 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) May 17 00:53:41.682856 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:53:41.682862 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) May 17 00:53:41.682868 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:53:41.682873 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:53:41.682879 kernel: audit: initializing netlink subsys (disabled) May 17 00:53:41.682885 kernel: audit: type=2000 audit(1747443220.059:1): state=initialized audit_enabled=0 res=1 May 17 00:53:41.682891 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:53:41.682897 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:53:41.682903 kernel: cpuidle: using governor menu May 17 00:53:41.682908 kernel: Simple Boot Flag at 0x36 set to 0x80 May 17 00:53:41.682914 kernel: ACPI: bus type PCI registered May 17 00:53:41.682920 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:53:41.682925 kernel: dca service started, version 1.12.1 May 17 00:53:41.682931 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) May 17 00:53:41.682937 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 May 17 00:53:41.682944 kernel: PCI: Using configuration type 1 for base access May 17 00:53:41.682950 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:53:41.682955 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:53:41.682961 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:53:41.682967 kernel: ACPI: Added _OSI(Module Device) May 17 00:53:41.682972 kernel: ACPI: Added _OSI(Processor Device) May 17 00:53:41.682978 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:53:41.682984 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:53:41.682989 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:53:41.682996 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:53:41.683002 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:53:41.683007 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:53:41.683013 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 17 00:53:41.683019 kernel: ACPI: Interpreter enabled May 17 00:53:41.683024 kernel: ACPI: PM: (supports S0 S1 S5) May 17 00:53:41.683030 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:53:41.683036 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:53:41.683041 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F May 17 00:53:41.683048 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) May 17 00:53:41.686076 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 17 00:53:41.686133 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] May 17 00:53:41.686201 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] May 17 00:53:41.686210 kernel: PCI host bridge to bus 0000:00 May 17 00:53:41.686258 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:53:41.686303 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] May 17 00:53:41.686343 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 17 00:53:41.686383 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:53:41.686422 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] May 17 00:53:41.686461 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] May 17 00:53:41.686515 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 May 17 00:53:41.686566 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 May 17 00:53:41.686622 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 May 17 00:53:41.686672 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a May 17 00:53:41.686719 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] May 17 00:53:41.686765 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 17 00:53:41.687242 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 17 00:53:41.687295 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 17 00:53:41.687346 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 17 00:53:41.687400 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 May 17 00:53:41.687447 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI May 17 00:53:41.687496 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB May 17 00:53:41.687546 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 May 17 00:53:41.687593 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] May 17 00:53:41.687639 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] May 17 00:53:41.687691 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 May 17 00:53:41.687736 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] May 17 00:53:41.687781 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] May 17 00:53:41.687826 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] May 17 00:53:41.687870 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] May 17 00:53:41.687916 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:53:41.687964 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 May 17 00:53:41.688017 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.688063 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold May 17 00:53:41.688112 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.688161 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold May 17 00:53:41.694512 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.694571 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold May 17 00:53:41.694645 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.694702 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold May 17 00:53:41.694753 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.694804 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold May 17 00:53:41.694880 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.694932 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold May 17 00:53:41.694984 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.695030 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold May 17 00:53:41.695079 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.695125 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold May 17 00:53:41.696252 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.696313 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold May 17 00:53:41.696371 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.696419 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold May 17 00:53:41.696477 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.696553 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold May 17 00:53:41.696619 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.696667 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold May 17 00:53:41.700480 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.700538 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold May 17 00:53:41.700591 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.700639 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold May 17 00:53:41.700688 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.700735 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold May 17 00:53:41.700787 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.700833 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold May 17 00:53:41.700882 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.700928 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold May 17 00:53:41.700977 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701038 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold May 17 00:53:41.701099 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701147 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold May 17 00:53:41.701238 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701286 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold May 17 00:53:41.701334 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701379 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold May 17 00:53:41.701429 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701476 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold May 17 00:53:41.701525 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701571 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold May 17 00:53:41.701619 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701665 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold May 17 00:53:41.701714 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701763 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold May 17 00:53:41.701812 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.701857 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold May 17 00:53:41.701907 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.703114 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold May 17 00:53:41.703193 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.703250 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold May 17 00:53:41.703303 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.703357 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold May 17 00:53:41.703415 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.703462 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold May 17 00:53:41.703513 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.703562 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold May 17 00:53:41.703611 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 May 17 00:53:41.703658 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold May 17 00:53:41.703708 kernel: pci_bus 0000:01: extended config space not accessible May 17 00:53:41.703778 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 17 00:53:41.703829 kernel: pci_bus 0000:02: extended config space not accessible May 17 00:53:41.703840 kernel: acpiphp: Slot [32] registered May 17 00:53:41.703848 kernel: acpiphp: Slot [33] registered May 17 00:53:41.703856 kernel: acpiphp: Slot [34] registered May 17 00:53:41.703865 kernel: acpiphp: Slot [35] registered May 17 00:53:41.703873 kernel: acpiphp: Slot [36] registered May 17 00:53:41.703883 kernel: acpiphp: Slot [37] registered May 17 00:53:41.703890 kernel: acpiphp: Slot [38] registered May 17 00:53:41.703896 kernel: acpiphp: Slot [39] registered May 17 00:53:41.703902 kernel: acpiphp: Slot [40] registered May 17 00:53:41.703987 kernel: acpiphp: Slot [41] registered May 17 00:53:41.703999 kernel: acpiphp: Slot [42] registered May 17 00:53:41.704006 kernel: acpiphp: Slot [43] registered May 17 00:53:41.704012 kernel: acpiphp: Slot [44] registered May 17 00:53:41.704018 kernel: acpiphp: Slot [45] registered May 17 00:53:41.704024 kernel: acpiphp: Slot [46] registered May 17 00:53:41.704029 kernel: acpiphp: Slot [47] registered May 17 00:53:41.704035 kernel: acpiphp: Slot [48] registered May 17 00:53:41.704041 kernel: acpiphp: Slot [49] registered May 17 00:53:41.704047 kernel: acpiphp: Slot [50] registered May 17 00:53:41.704053 kernel: acpiphp: Slot [51] registered May 17 00:53:41.704059 kernel: acpiphp: Slot [52] registered May 17 00:53:41.704065 kernel: acpiphp: Slot [53] registered May 17 00:53:41.704071 kernel: acpiphp: Slot [54] registered May 17 00:53:41.704077 kernel: acpiphp: Slot [55] registered May 17 00:53:41.704082 kernel: acpiphp: Slot [56] registered May 17 00:53:41.704088 kernel: acpiphp: Slot [57] registered May 17 00:53:41.704093 kernel: acpiphp: Slot [58] registered May 17 00:53:41.704099 kernel: acpiphp: Slot [59] registered May 17 00:53:41.704105 kernel: acpiphp: Slot [60] registered May 17 00:53:41.704112 kernel: acpiphp: Slot [61] registered May 17 00:53:41.704118 kernel: acpiphp: Slot [62] registered May 17 00:53:41.704123 kernel: acpiphp: Slot [63] registered May 17 00:53:41.704198 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) May 17 00:53:41.704250 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 17 00:53:41.704299 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 17 00:53:41.704345 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:53:41.704391 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) May 17 00:53:41.704440 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) May 17 00:53:41.704484 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) May 17 00:53:41.704530 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) May 17 00:53:41.704575 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) May 17 00:53:41.704627 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 May 17 00:53:41.704675 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] May 17 00:53:41.704722 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] May 17 00:53:41.704772 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 17 00:53:41.704819 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold May 17 00:53:41.704865 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 17 00:53:41.704913 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 17 00:53:41.704959 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 17 00:53:41.705004 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 17 00:53:41.705051 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 17 00:53:41.705097 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 17 00:53:41.705144 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 17 00:53:41.705222 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:53:41.705269 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 17 00:53:41.705315 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 17 00:53:41.705365 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 17 00:53:41.705411 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:53:41.705458 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 17 00:53:41.705506 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 17 00:53:41.705550 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:53:41.705596 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 17 00:53:41.705640 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 17 00:53:41.705686 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:53:41.705733 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 17 00:53:41.705779 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 17 00:53:41.705823 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:53:41.705869 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 17 00:53:41.705913 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 17 00:53:41.705959 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:53:41.706005 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 17 00:53:41.706053 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 17 00:53:41.706097 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:53:41.706148 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 May 17 00:53:41.706206 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] May 17 00:53:41.706254 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] May 17 00:53:41.706300 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] May 17 00:53:41.706348 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] May 17 00:53:41.706394 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 17 00:53:41.706444 kernel: pci 0000:0b:00.0: supports D1 D2 May 17 00:53:41.706491 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 17 00:53:41.706538 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 17 00:53:41.706585 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 17 00:53:41.706631 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 17 00:53:41.706676 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 17 00:53:41.706722 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 17 00:53:41.706767 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 17 00:53:41.706814 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 17 00:53:41.706859 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:53:41.706905 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 17 00:53:41.706950 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 17 00:53:41.706996 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 17 00:53:41.707040 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:53:41.707086 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 17 00:53:41.707133 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 17 00:53:41.707189 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:53:41.707236 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 17 00:53:41.707282 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 17 00:53:41.707327 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:53:41.707373 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 17 00:53:41.707418 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 17 00:53:41.707464 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:53:41.707513 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 17 00:53:41.707558 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 17 00:53:41.707604 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:53:41.707650 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 17 00:53:41.707695 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 17 00:53:41.707740 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:53:41.707787 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 17 00:53:41.707832 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 17 00:53:41.707880 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 17 00:53:41.707926 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:53:41.707972 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 17 00:53:41.708018 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 17 00:53:41.708063 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 17 00:53:41.708108 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:53:41.708153 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 17 00:53:41.708227 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 17 00:53:41.708277 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 17 00:53:41.708324 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:53:41.708378 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 17 00:53:41.708424 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 17 00:53:41.708470 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:53:41.708516 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 17 00:53:41.708562 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 17 00:53:41.708611 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:53:41.708657 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 17 00:53:41.708704 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 17 00:53:41.708750 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:53:41.708796 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 17 00:53:41.708842 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 17 00:53:41.708887 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:53:41.708934 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 17 00:53:41.708982 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 17 00:53:41.709028 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:53:41.709074 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 17 00:53:41.709121 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 17 00:53:41.709167 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 17 00:53:41.709223 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:53:41.709270 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 17 00:53:41.709315 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 17 00:53:41.709363 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 17 00:53:41.709408 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:53:41.709454 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 17 00:53:41.709499 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 17 00:53:41.709544 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:53:41.709590 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 17 00:53:41.709635 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 17 00:53:41.709680 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:53:41.709728 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 17 00:53:41.709773 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 17 00:53:41.709818 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:53:41.709865 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 17 00:53:41.709910 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 17 00:53:41.709956 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:53:41.710002 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 17 00:53:41.710047 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 17 00:53:41.710095 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:53:41.710142 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 17 00:53:41.710325 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 17 00:53:41.710383 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:53:41.710392 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 May 17 00:53:41.710398 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 May 17 00:53:41.710404 kernel: ACPI: PCI: Interrupt link LNKB disabled May 17 00:53:41.710410 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:53:41.710418 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 May 17 00:53:41.710423 kernel: iommu: Default domain type: Translated May 17 00:53:41.710429 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:53:41.710476 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device May 17 00:53:41.710521 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:53:41.710567 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible May 17 00:53:41.710575 kernel: vgaarb: loaded May 17 00:53:41.710581 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:53:41.710587 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:53:41.710594 kernel: PTP clock support registered May 17 00:53:41.710601 kernel: PCI: Using ACPI for IRQ routing May 17 00:53:41.710607 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:53:41.710612 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] May 17 00:53:41.710618 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] May 17 00:53:41.710624 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 May 17 00:53:41.710630 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter May 17 00:53:41.710636 kernel: clocksource: Switched to clocksource tsc-early May 17 00:53:41.710641 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:53:41.710648 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:53:41.710654 kernel: pnp: PnP ACPI init May 17 00:53:41.710703 kernel: system 00:00: [io 0x1000-0x103f] has been reserved May 17 00:53:41.710746 kernel: system 00:00: [io 0x1040-0x104f] has been reserved May 17 00:53:41.710787 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved May 17 00:53:41.710832 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved May 17 00:53:41.710877 kernel: pnp 00:06: [dma 2] May 17 00:53:41.710924 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved May 17 00:53:41.710967 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved May 17 00:53:41.711008 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved May 17 00:53:41.711016 kernel: pnp: PnP ACPI: found 8 devices May 17 00:53:41.711022 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:53:41.711028 kernel: NET: Registered PF_INET protocol family May 17 00:53:41.711034 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:53:41.711040 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:53:41.711048 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:53:41.711054 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:53:41.711060 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:53:41.711065 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:53:41.711071 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:53:41.711077 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:53:41.711083 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:53:41.711089 kernel: NET: Registered PF_XDP protocol family May 17 00:53:41.711136 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 May 17 00:53:41.711198 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 17 00:53:41.711247 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 17 00:53:41.711293 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 17 00:53:41.711344 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 17 00:53:41.711391 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 May 17 00:53:41.711439 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 May 17 00:53:41.711486 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 May 17 00:53:41.711531 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 May 17 00:53:41.711577 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 May 17 00:53:41.711622 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 May 17 00:53:41.711669 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 May 17 00:53:41.711717 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 May 17 00:53:41.711762 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 May 17 00:53:41.711807 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 May 17 00:53:41.711852 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 May 17 00:53:41.711898 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 May 17 00:53:41.711944 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 May 17 00:53:41.711991 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 May 17 00:53:41.712036 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 May 17 00:53:41.712082 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 May 17 00:53:41.712128 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 May 17 00:53:41.712474 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 May 17 00:53:41.712535 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:53:41.712588 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:53:41.712635 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 17 00:53:41.712682 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.712728 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 17 00:53:41.712774 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713038 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713090 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713138 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713204 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713253 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713300 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713346 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713393 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713438 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713484 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713529 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713578 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713624 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713669 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713714 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713760 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713805 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713850 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713895 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 17 00:53:41.713943 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.713988 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 17 00:53:41.714034 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.714079 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 17 00:53:41.714124 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.714444 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 17 00:53:41.714712 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.714773 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 17 00:53:41.714825 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.714873 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 17 00:53:41.714931 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.714979 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715024 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715070 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715115 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715161 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715217 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715263 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715309 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715354 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715400 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715445 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715491 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715536 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715580 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715628 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715674 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715719 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715764 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715809 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715855 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715901 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 17 00:53:41.715947 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.715992 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 17 00:53:41.716038 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.716086 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 17 00:53:41.716131 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.716457 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 17 00:53:41.716514 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.716776 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 17 00:53:41.716828 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.716875 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 17 00:53:41.716927 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.716972 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717022 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717068 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717114 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717159 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717213 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717259 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717305 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717356 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717402 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717449 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717494 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717540 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717585 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717630 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717675 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717720 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 17 00:53:41.717765 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 17 00:53:41.717812 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 17 00:53:41.717857 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] May 17 00:53:41.717904 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 17 00:53:41.717949 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 17 00:53:41.717994 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:53:41.718044 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] May 17 00:53:41.718090 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 17 00:53:41.718135 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 17 00:53:41.718431 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 17 00:53:41.718486 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:53:41.718755 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 17 00:53:41.718809 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 17 00:53:41.718858 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 17 00:53:41.718909 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:53:41.718956 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 17 00:53:41.719003 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 17 00:53:41.719048 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 17 00:53:41.719093 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:53:41.719138 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 17 00:53:41.719199 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 17 00:53:41.719247 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:53:41.719293 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 17 00:53:41.719338 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 17 00:53:41.719382 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:53:41.719430 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 17 00:53:41.719478 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 17 00:53:41.719523 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:53:41.719568 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 17 00:53:41.719613 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 17 00:53:41.719659 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:53:41.719704 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 17 00:53:41.719749 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 17 00:53:41.719794 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:53:41.719842 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] May 17 00:53:41.719889 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 17 00:53:41.719935 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 17 00:53:41.719980 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 17 00:53:41.720026 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:53:41.720071 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 17 00:53:41.720117 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 17 00:53:41.720162 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 17 00:53:41.720459 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:53:41.720720 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 17 00:53:41.720774 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 17 00:53:41.720825 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 17 00:53:41.720871 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:53:41.721154 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 17 00:53:41.721222 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 17 00:53:41.721272 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:53:41.721320 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 17 00:53:41.721648 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 17 00:53:41.721701 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:53:41.721750 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 17 00:53:41.722075 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 17 00:53:41.722128 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:53:41.722212 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 17 00:53:41.722262 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 17 00:53:41.722308 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:53:41.722355 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 17 00:53:41.722401 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 17 00:53:41.722447 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:53:41.722492 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 17 00:53:41.722538 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 17 00:53:41.722586 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 17 00:53:41.722631 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:53:41.722677 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 17 00:53:41.722722 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 17 00:53:41.722768 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 17 00:53:41.722813 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:53:41.723084 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 17 00:53:41.723133 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 17 00:53:41.723188 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 17 00:53:41.723238 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:53:41.723284 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 17 00:53:41.723330 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 17 00:53:41.723375 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:53:41.723421 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 17 00:53:41.723467 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 17 00:53:41.723512 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:53:41.723558 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 17 00:53:41.723603 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 17 00:53:41.723648 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:53:41.723696 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 17 00:53:41.723741 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 17 00:53:41.723787 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:53:41.723833 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 17 00:53:41.723879 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 17 00:53:41.723924 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:53:41.723970 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 17 00:53:41.724016 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 17 00:53:41.724061 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 17 00:53:41.724110 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:53:41.724157 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 17 00:53:41.724211 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 17 00:53:41.724258 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 17 00:53:41.724302 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:53:41.724353 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 17 00:53:41.724398 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 17 00:53:41.724444 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:53:41.724490 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 17 00:53:41.724536 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 17 00:53:41.724584 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:53:41.724629 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 17 00:53:41.724675 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 17 00:53:41.724720 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:53:41.724766 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 17 00:53:41.724811 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 17 00:53:41.724857 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:53:41.724903 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 17 00:53:41.724948 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 17 00:53:41.724996 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:53:41.725042 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 17 00:53:41.725087 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 17 00:53:41.725133 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:53:41.725184 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] May 17 00:53:41.725226 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] May 17 00:53:41.725267 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] May 17 00:53:41.725307 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] May 17 00:53:41.725347 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] May 17 00:53:41.725393 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] May 17 00:53:41.725436 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] May 17 00:53:41.725478 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] May 17 00:53:41.725520 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] May 17 00:53:41.725561 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] May 17 00:53:41.725603 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] May 17 00:53:41.725644 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] May 17 00:53:41.725688 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] May 17 00:53:41.725737 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] May 17 00:53:41.725780 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] May 17 00:53:41.725822 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] May 17 00:53:41.725868 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] May 17 00:53:41.725911 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] May 17 00:53:41.725953 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] May 17 00:53:41.726001 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] May 17 00:53:41.726045 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] May 17 00:53:41.726087 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] May 17 00:53:41.726133 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] May 17 00:53:41.726183 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] May 17 00:53:41.726230 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] May 17 00:53:41.726276 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] May 17 00:53:41.726322 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] May 17 00:53:41.726382 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] May 17 00:53:41.726430 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] May 17 00:53:41.726497 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] May 17 00:53:41.726767 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] May 17 00:53:41.726817 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] May 17 00:53:41.726868 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] May 17 00:53:41.726912 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] May 17 00:53:41.726976 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] May 17 00:53:41.727268 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] May 17 00:53:41.727316 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] May 17 00:53:41.727573 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] May 17 00:53:41.727631 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] May 17 00:53:41.727678 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] May 17 00:53:41.727721 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] May 17 00:53:41.728049 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] May 17 00:53:41.728099 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] May 17 00:53:41.728149 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] May 17 00:53:41.728243 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] May 17 00:53:41.728297 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] May 17 00:53:41.728352 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] May 17 00:53:41.728401 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] May 17 00:53:41.728445 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] May 17 00:53:41.728599 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] May 17 00:53:41.728653 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] May 17 00:53:41.728701 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] May 17 00:53:41.729086 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] May 17 00:53:41.729137 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] May 17 00:53:41.729250 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] May 17 00:53:41.729297 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] May 17 00:53:41.729478 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] May 17 00:53:41.729532 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] May 17 00:53:41.729782 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] May 17 00:53:41.729829 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] May 17 00:53:41.729880 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] May 17 00:53:41.730217 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] May 17 00:53:41.730276 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] May 17 00:53:41.730325 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] May 17 00:53:41.730378 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] May 17 00:53:41.730422 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] May 17 00:53:41.730469 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] May 17 00:53:41.730620 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] May 17 00:53:41.730671 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] May 17 00:53:41.730715 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] May 17 00:53:41.731051 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] May 17 00:53:41.731098 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] May 17 00:53:41.731142 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] May 17 00:53:41.731212 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] May 17 00:53:41.731257 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] May 17 00:53:41.731299 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] May 17 00:53:41.731353 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] May 17 00:53:41.731396 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] May 17 00:53:41.731445 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] May 17 00:53:41.731487 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] May 17 00:53:41.731533 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] May 17 00:53:41.731575 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] May 17 00:53:41.731623 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] May 17 00:53:41.731668 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] May 17 00:53:41.731715 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] May 17 00:53:41.731758 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] May 17 00:53:41.731804 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] May 17 00:53:41.731848 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] May 17 00:53:41.731901 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:53:41.731910 kernel: PCI: CLS 32 bytes, default 64 May 17 00:53:41.731917 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:53:41.731924 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 17 00:53:41.731930 kernel: clocksource: Switched to clocksource tsc May 17 00:53:41.731937 kernel: Initialise system trusted keyrings May 17 00:53:41.731943 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:53:41.731949 kernel: Key type asymmetric registered May 17 00:53:41.731957 kernel: Asymmetric key parser 'x509' registered May 17 00:53:41.731962 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:53:41.731969 kernel: io scheduler mq-deadline registered May 17 00:53:41.731976 kernel: io scheduler kyber registered May 17 00:53:41.731982 kernel: io scheduler bfq registered May 17 00:53:41.732030 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 May 17 00:53:41.732077 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.732124 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 May 17 00:53:41.732177 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.732235 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 May 17 00:53:41.732281 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.732328 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 May 17 00:53:41.732375 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.732422 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 May 17 00:53:41.732469 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.732518 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 May 17 00:53:41.732718 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.732976 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 May 17 00:53:41.733030 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.733389 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 May 17 00:53:41.733447 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.733497 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 May 17 00:53:41.733545 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.733706 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 May 17 00:53:41.733757 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.734089 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 May 17 00:53:41.734146 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.734223 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 May 17 00:53:41.734273 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.734463 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 May 17 00:53:41.734735 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.734789 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 May 17 00:53:41.734840 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.734893 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 May 17 00:53:41.734941 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.734989 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 May 17 00:53:41.735036 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.735083 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 May 17 00:53:41.735133 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.735442 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 May 17 00:53:41.735499 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.735771 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 May 17 00:53:41.735825 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.735876 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 May 17 00:53:41.735929 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.735981 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 May 17 00:53:41.736029 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736076 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 May 17 00:53:41.736125 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736181 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 May 17 00:53:41.736236 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736283 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 May 17 00:53:41.736330 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736376 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 May 17 00:53:41.736422 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736468 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 May 17 00:53:41.736517 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736563 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 May 17 00:53:41.736609 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736656 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 May 17 00:53:41.736702 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736750 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 May 17 00:53:41.736798 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736844 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 May 17 00:53:41.736891 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.736939 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 May 17 00:53:41.736986 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.737035 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 May 17 00:53:41.737082 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 17 00:53:41.737091 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:53:41.737098 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:53:41.737104 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:53:41.737111 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 May 17 00:53:41.737117 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:53:41.737125 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:53:41.737431 kernel: rtc_cmos 00:01: registered as rtc0 May 17 00:53:41.737484 kernel: rtc_cmos 00:01: setting system clock to 2025-05-17T00:53:41 UTC (1747443221) May 17 00:53:41.737529 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram May 17 00:53:41.737538 kernel: intel_pstate: CPU model not supported May 17 00:53:41.737544 kernel: NET: Registered PF_INET6 protocol family May 17 00:53:41.737550 kernel: Segment Routing with IPv6 May 17 00:53:41.737621 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:53:41.737632 kernel: NET: Registered PF_PACKET protocol family May 17 00:53:41.737639 kernel: Key type dns_resolver registered May 17 00:53:41.737646 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:53:41.737653 kernel: IPI shorthand broadcast: enabled May 17 00:53:41.737660 kernel: sched_clock: Marking stable (860016431, 225515841)->(1157640550, -72108278) May 17 00:53:41.737666 kernel: registered taskstats version 1 May 17 00:53:41.737672 kernel: Loading compiled-in X.509 certificates May 17 00:53:41.737678 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:53:41.737685 kernel: Key type .fscrypt registered May 17 00:53:41.737692 kernel: Key type fscrypt-provisioning registered May 17 00:53:41.737698 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:53:41.737705 kernel: ima: Allocated hash algorithm: sha1 May 17 00:53:41.737711 kernel: ima: No architecture policies found May 17 00:53:41.737717 kernel: clk: Disabling unused clocks May 17 00:53:41.737723 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:53:41.737730 kernel: Write protecting the kernel read-only data: 28672k May 17 00:53:41.737736 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:53:41.737743 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:53:41.737750 kernel: Run /init as init process May 17 00:53:41.737757 kernel: with arguments: May 17 00:53:41.737763 kernel: /init May 17 00:53:41.737769 kernel: with environment: May 17 00:53:41.737775 kernel: HOME=/ May 17 00:53:41.737781 kernel: TERM=linux May 17 00:53:41.737787 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:53:41.737796 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:53:41.737806 systemd[1]: Detected virtualization vmware. May 17 00:53:41.737813 systemd[1]: Detected architecture x86-64. May 17 00:53:41.737820 systemd[1]: Running in initrd. May 17 00:53:41.737826 systemd[1]: No hostname configured, using default hostname. May 17 00:53:41.737832 systemd[1]: Hostname set to . May 17 00:53:41.737839 systemd[1]: Initializing machine ID from random generator. May 17 00:53:41.737845 systemd[1]: Queued start job for default target initrd.target. May 17 00:53:41.737852 systemd[1]: Started systemd-ask-password-console.path. May 17 00:53:41.737859 systemd[1]: Reached target cryptsetup.target. May 17 00:53:41.737865 systemd[1]: Reached target paths.target. May 17 00:53:41.737872 systemd[1]: Reached target slices.target. May 17 00:53:41.737878 systemd[1]: Reached target swap.target. May 17 00:53:41.737884 systemd[1]: Reached target timers.target. May 17 00:53:41.737891 systemd[1]: Listening on iscsid.socket. May 17 00:53:41.737897 systemd[1]: Listening on iscsiuio.socket. May 17 00:53:41.737904 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:53:41.737912 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:53:41.737918 systemd[1]: Listening on systemd-journald.socket. May 17 00:53:41.737924 systemd[1]: Listening on systemd-networkd.socket. May 17 00:53:41.737931 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:53:41.737938 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:53:41.737944 systemd[1]: Reached target sockets.target. May 17 00:53:41.737950 systemd[1]: Starting kmod-static-nodes.service... May 17 00:53:41.737957 systemd[1]: Finished network-cleanup.service. May 17 00:53:41.737964 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:53:41.737971 systemd[1]: Starting systemd-journald.service... May 17 00:53:41.737977 systemd[1]: Starting systemd-modules-load.service... May 17 00:53:41.737983 systemd[1]: Starting systemd-resolved.service... May 17 00:53:41.737990 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:53:41.737996 systemd[1]: Finished kmod-static-nodes.service. May 17 00:53:41.738002 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:53:41.738009 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:53:41.738015 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:53:41.738021 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:53:41.738029 kernel: audit: type=1130 audit(1747443221.678:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.738036 kernel: audit: type=1130 audit(1747443221.682:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.738043 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:53:41.738049 systemd[1]: Started systemd-resolved.service. May 17 00:53:41.738055 systemd[1]: Reached target nss-lookup.target. May 17 00:53:41.738062 kernel: audit: type=1130 audit(1747443221.690:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.738068 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:53:41.738075 kernel: audit: type=1130 audit(1747443221.695:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.738082 systemd[1]: Starting dracut-cmdline.service... May 17 00:53:41.738089 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:53:41.738095 kernel: Bridge firewalling registered May 17 00:53:41.738104 systemd-journald[216]: Journal started May 17 00:53:41.738138 systemd-journald[216]: Runtime Journal (/run/log/journal/48f155305a5147fe94bb1edf26ce2b6c) is 4.8M, max 38.8M, 34.0M free. May 17 00:53:41.741369 systemd[1]: Started systemd-journald.service. May 17 00:53:41.741387 kernel: audit: type=1130 audit(1747443221.737:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.678774 systemd-modules-load[217]: Inserted module 'overlay' May 17 00:53:41.688428 systemd-resolved[218]: Positive Trust Anchors: May 17 00:53:41.688433 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:53:41.688453 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:53:41.690093 systemd-resolved[218]: Defaulting to hostname 'linux'. May 17 00:53:41.742072 systemd-modules-load[217]: Inserted module 'br_netfilter' May 17 00:53:41.743971 dracut-cmdline[232]: dracut-dracut-053 May 17 00:53:41.743971 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 17 00:53:41.743971 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:53:41.756186 kernel: SCSI subsystem initialized May 17 00:53:41.766154 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:53:41.766201 kernel: device-mapper: uevent: version 1.0.3 May 17 00:53:41.766211 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:53:41.768634 kernel: Loading iSCSI transport class v2.0-870. May 17 00:53:41.768346 systemd-modules-load[217]: Inserted module 'dm_multipath' May 17 00:53:41.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.769005 systemd[1]: Finished systemd-modules-load.service. May 17 00:53:41.772197 kernel: audit: type=1130 audit(1747443221.767:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.769573 systemd[1]: Starting systemd-sysctl.service... May 17 00:53:41.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.776402 systemd[1]: Finished systemd-sysctl.service. May 17 00:53:41.779185 kernel: audit: type=1130 audit(1747443221.775:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.785199 kernel: iscsi: registered transport (tcp) May 17 00:53:41.801200 kernel: iscsi: registered transport (qla4xxx) May 17 00:53:41.801241 kernel: QLogic iSCSI HBA Driver May 17 00:53:41.820508 systemd[1]: Finished dracut-cmdline.service. May 17 00:53:41.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.821371 systemd[1]: Starting dracut-pre-udev.service... May 17 00:53:41.823396 kernel: audit: type=1130 audit(1747443221.819:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:41.860189 kernel: raid6: avx2x4 gen() 48215 MB/s May 17 00:53:41.877190 kernel: raid6: avx2x4 xor() 20433 MB/s May 17 00:53:41.894188 kernel: raid6: avx2x2 gen() 53381 MB/s May 17 00:53:41.911192 kernel: raid6: avx2x2 xor() 23704 MB/s May 17 00:53:41.928194 kernel: raid6: avx2x1 gen() 28091 MB/s May 17 00:53:41.945193 kernel: raid6: avx2x1 xor() 22112 MB/s May 17 00:53:41.962191 kernel: raid6: sse2x4 gen() 19479 MB/s May 17 00:53:41.979191 kernel: raid6: sse2x4 xor() 11231 MB/s May 17 00:53:41.996186 kernel: raid6: sse2x2 gen() 16844 MB/s May 17 00:53:42.013188 kernel: raid6: sse2x2 xor() 9118 MB/s May 17 00:53:42.030188 kernel: raid6: sse2x1 gen() 18124 MB/s May 17 00:53:42.047365 kernel: raid6: sse2x1 xor() 8974 MB/s May 17 00:53:42.047388 kernel: raid6: using algorithm avx2x2 gen() 53381 MB/s May 17 00:53:42.047403 kernel: raid6: .... xor() 23704 MB/s, rmw enabled May 17 00:53:42.048563 kernel: raid6: using avx2x2 recovery algorithm May 17 00:53:42.057191 kernel: xor: automatically using best checksumming function avx May 17 00:53:42.118611 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:53:42.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:42.122634 systemd[1]: Finished dracut-pre-udev.service. May 17 00:53:42.121000 audit: BPF prog-id=7 op=LOAD May 17 00:53:42.121000 audit: BPF prog-id=8 op=LOAD May 17 00:53:42.123289 systemd[1]: Starting systemd-udevd.service... May 17 00:53:42.126254 kernel: audit: type=1130 audit(1747443222.121:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:42.133751 systemd-udevd[415]: Using default interface naming scheme 'v252'. May 17 00:53:42.136670 systemd[1]: Started systemd-udevd.service. May 17 00:53:42.137298 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:53:42.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:42.144711 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation May 17 00:53:42.159871 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:53:42.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:42.160430 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:53:42.220813 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:53:42.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:42.279181 kernel: VMware PVSCSI driver - version 1.0.7.0-k May 17 00:53:42.281179 kernel: vmw_pvscsi: using 64bit dma May 17 00:53:42.283179 kernel: vmw_pvscsi: max_id: 16 May 17 00:53:42.283201 kernel: vmw_pvscsi: setting ring_pages to 8 May 17 00:53:42.294290 kernel: vmw_pvscsi: enabling reqCallThreshold May 17 00:53:42.294323 kernel: vmw_pvscsi: driver-based request coalescing enabled May 17 00:53:42.294332 kernel: vmw_pvscsi: using MSI-X May 17 00:53:42.295640 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 May 17 00:53:42.296626 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 May 17 00:53:42.297183 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 May 17 00:53:42.301223 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI May 17 00:53:42.301246 kernel: libata version 3.00 loaded. May 17 00:53:42.315194 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 May 17 00:53:42.319194 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:53:42.319211 kernel: ata_piix 0000:00:07.1: version 2.13 May 17 00:53:42.334077 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps May 17 00:53:42.334179 kernel: scsi host1: ata_piix May 17 00:53:42.334267 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 May 17 00:53:42.334341 kernel: scsi host2: ata_piix May 17 00:53:42.334413 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 May 17 00:53:42.334422 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 May 17 00:53:42.337760 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) May 17 00:53:42.346101 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:53:42.346196 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 May 17 00:53:42.346263 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:53:42.346272 kernel: sd 0:0:0:0: [sda] Cache data unavailable May 17 00:53:42.346330 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through May 17 00:53:42.346400 kernel: AES CTR mode by8 optimization enabled May 17 00:53:42.346409 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:53:42.346416 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:53:42.502189 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 May 17 00:53:42.507701 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 May 17 00:53:42.534188 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray May 17 00:53:42.551369 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:53:42.551381 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 17 00:53:42.581188 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (470) May 17 00:53:42.583962 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:53:42.588340 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:53:42.590937 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:53:42.598021 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:53:42.598381 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:53:42.599208 systemd[1]: Starting disk-uuid.service... May 17 00:53:42.698187 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:53:42.739187 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:53:43.765858 disk-uuid[550]: The operation has completed successfully. May 17 00:53:43.766184 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:53:43.824444 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:53:43.824737 systemd[1]: Finished disk-uuid.service. May 17 00:53:43.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:43.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:43.825507 systemd[1]: Starting verity-setup.service... May 17 00:53:43.855189 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:53:44.009616 systemd[1]: Found device dev-mapper-usr.device. May 17 00:53:44.010481 systemd[1]: Mounting sysusr-usr.mount... May 17 00:53:44.012232 systemd[1]: Finished verity-setup.service. May 17 00:53:44.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.294220 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:53:44.294432 systemd[1]: Mounted sysusr-usr.mount. May 17 00:53:44.295061 systemd[1]: Starting afterburn-network-kargs.service... May 17 00:53:44.295587 systemd[1]: Starting ignition-setup.service... May 17 00:53:44.340729 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:53:44.340765 kernel: BTRFS info (device sda6): using free space tree May 17 00:53:44.340774 kernel: BTRFS info (device sda6): has skinny extents May 17 00:53:44.353189 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:53:44.362044 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:53:44.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.367707 systemd[1]: Finished ignition-setup.service. May 17 00:53:44.368347 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:53:44.465517 systemd[1]: Finished afterburn-network-kargs.service. May 17 00:53:44.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.466361 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:53:44.521038 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:53:44.521967 systemd[1]: Starting systemd-networkd.service... May 17 00:53:44.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.520000 audit: BPF prog-id=9 op=LOAD May 17 00:53:44.536228 systemd-networkd[735]: lo: Link UP May 17 00:53:44.536235 systemd-networkd[735]: lo: Gained carrier May 17 00:53:44.536511 systemd-networkd[735]: Enumeration completed May 17 00:53:44.536704 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. May 17 00:53:44.540194 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 17 00:53:44.540315 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 17 00:53:44.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.537154 systemd[1]: Started systemd-networkd.service. May 17 00:53:44.537329 systemd[1]: Reached target network.target. May 17 00:53:44.537874 systemd[1]: Starting iscsiuio.service... May 17 00:53:44.539593 systemd-networkd[735]: ens192: Link UP May 17 00:53:44.539596 systemd-networkd[735]: ens192: Gained carrier May 17 00:53:44.543568 systemd[1]: Started iscsiuio.service. May 17 00:53:44.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.544381 systemd[1]: Starting iscsid.service... May 17 00:53:44.546294 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:53:44.546294 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:53:44.546294 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:53:44.546294 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:53:44.546294 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:53:44.547318 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:53:44.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.547190 systemd[1]: Started iscsid.service. May 17 00:53:44.547895 systemd[1]: Starting dracut-initqueue.service... May 17 00:53:44.556344 systemd[1]: Finished dracut-initqueue.service. May 17 00:53:44.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.556524 systemd[1]: Reached target remote-fs-pre.target. May 17 00:53:44.556618 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:53:44.556704 systemd[1]: Reached target remote-fs.target. May 17 00:53:44.557313 systemd[1]: Starting dracut-pre-mount.service... May 17 00:53:44.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.563941 systemd[1]: Finished dracut-pre-mount.service. May 17 00:53:44.653897 ignition[607]: Ignition 2.14.0 May 17 00:53:44.653908 ignition[607]: Stage: fetch-offline May 17 00:53:44.653947 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:53:44.653963 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:53:44.657952 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:53:44.658035 ignition[607]: parsed url from cmdline: "" May 17 00:53:44.658037 ignition[607]: no config URL provided May 17 00:53:44.658041 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:53:44.658045 ignition[607]: no config at "/usr/lib/ignition/user.ign" May 17 00:53:44.658655 ignition[607]: config successfully fetched May 17 00:53:44.658681 ignition[607]: parsing config with SHA512: af45f75cc9c4f0955986e31b18e0c8056fc750c8e0db8143f6117a35ac3f131338d1850fdf30714018fdac862644ecd0b75682c8f3e42d76b3cf007ef77bd64b May 17 00:53:44.672868 unknown[607]: fetched base config from "system" May 17 00:53:44.672885 unknown[607]: fetched user config from "vmware" May 17 00:53:44.673314 ignition[607]: fetch-offline: fetch-offline passed May 17 00:53:44.673369 ignition[607]: Ignition finished successfully May 17 00:53:44.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.673989 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:53:44.674145 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 17 00:53:44.674695 systemd[1]: Starting ignition-kargs.service... May 17 00:53:44.681991 ignition[755]: Ignition 2.14.0 May 17 00:53:44.681999 ignition[755]: Stage: kargs May 17 00:53:44.682075 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:53:44.682085 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:53:44.683228 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:53:44.684093 ignition[755]: kargs: kargs passed May 17 00:53:44.684135 ignition[755]: Ignition finished successfully May 17 00:53:44.685164 systemd[1]: Finished ignition-kargs.service. May 17 00:53:44.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.685956 systemd[1]: Starting ignition-disks.service... May 17 00:53:44.691206 ignition[761]: Ignition 2.14.0 May 17 00:53:44.691517 ignition[761]: Stage: disks May 17 00:53:44.691722 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:53:44.691893 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:53:44.693477 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:53:44.695837 ignition[761]: disks: disks passed May 17 00:53:44.696053 ignition[761]: Ignition finished successfully May 17 00:53:44.696902 systemd[1]: Finished ignition-disks.service. May 17 00:53:44.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.697066 systemd[1]: Reached target initrd-root-device.target. May 17 00:53:44.697185 systemd[1]: Reached target local-fs-pre.target. May 17 00:53:44.697303 systemd[1]: Reached target local-fs.target. May 17 00:53:44.697474 systemd[1]: Reached target sysinit.target. May 17 00:53:44.697578 systemd[1]: Reached target basic.target. May 17 00:53:44.698362 systemd[1]: Starting systemd-fsck-root.service... May 17 00:53:44.785261 systemd-fsck[769]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 17 00:53:44.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.786421 systemd[1]: Finished systemd-fsck-root.service. May 17 00:53:44.787028 systemd[1]: Mounting sysroot.mount... May 17 00:53:44.798739 systemd[1]: Mounted sysroot.mount. May 17 00:53:44.799053 systemd[1]: Reached target initrd-root-fs.target. May 17 00:53:44.799333 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:53:44.800651 systemd[1]: Mounting sysroot-usr.mount... May 17 00:53:44.801155 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:53:44.801354 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:53:44.801375 systemd[1]: Reached target ignition-diskful.target. May 17 00:53:44.802493 systemd[1]: Mounted sysroot-usr.mount. May 17 00:53:44.803082 systemd[1]: Starting initrd-setup-root.service... May 17 00:53:44.808236 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:53:44.820036 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory May 17 00:53:44.823519 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:53:44.826844 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:53:44.893553 systemd[1]: Finished initrd-setup-root.service. May 17 00:53:44.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.894119 systemd[1]: Starting ignition-mount.service... May 17 00:53:44.894578 systemd[1]: Starting sysroot-boot.service... May 17 00:53:44.898005 bash[820]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:53:44.903206 ignition[821]: INFO : Ignition 2.14.0 May 17 00:53:44.903467 ignition[821]: INFO : Stage: mount May 17 00:53:44.903642 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:53:44.903795 ignition[821]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:53:44.905345 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:53:44.906852 ignition[821]: INFO : mount: mount passed May 17 00:53:44.907003 ignition[821]: INFO : Ignition finished successfully May 17 00:53:44.907546 systemd[1]: Finished ignition-mount.service. May 17 00:53:44.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:44.951781 systemd[1]: Finished sysroot-boot.service. May 17 00:53:44.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:45.244827 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:53:45.342205 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (830) May 17 00:53:45.350001 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:53:45.350044 kernel: BTRFS info (device sda6): using free space tree May 17 00:53:45.350055 kernel: BTRFS info (device sda6): has skinny extents May 17 00:53:45.362195 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:53:45.365544 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:53:45.366209 systemd[1]: Starting ignition-files.service... May 17 00:53:45.376680 ignition[850]: INFO : Ignition 2.14.0 May 17 00:53:45.376680 ignition[850]: INFO : Stage: files May 17 00:53:45.377031 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:53:45.377031 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:53:45.378366 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:53:45.381649 ignition[850]: DEBUG : files: compiled without relabeling support, skipping May 17 00:53:45.382114 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:53:45.382114 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:53:45.386415 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:53:45.386585 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:53:45.387113 unknown[850]: wrote ssh authorized keys file for user: core May 17 00:53:45.387384 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:53:45.388223 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:53:45.388410 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 17 00:53:45.462721 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:53:45.557329 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:53:45.557625 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:53:45.557976 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:53:45.558189 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:53:45.558459 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:53:45.558667 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:53:45.558913 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:53:45.559101 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:53:45.559343 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:53:45.563662 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:53:45.563959 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:53:45.564150 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:53:45.564429 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:53:45.565078 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 17 00:53:45.565313 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:53:45.568604 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1979321102" May 17 00:53:45.568840 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1979321102": device or resource busy May 17 00:53:45.568840 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1979321102", trying btrfs: device or resource busy May 17 00:53:45.568840 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1979321102" May 17 00:53:45.568840 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1979321102" May 17 00:53:45.572829 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1979321102" May 17 00:53:45.573880 systemd[1]: mnt-oem1979321102.mount: Deactivated successfully. May 17 00:53:45.574390 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1979321102" May 17 00:53:45.574615 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 17 00:53:45.574844 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:53:45.575121 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 May 17 00:53:46.090290 systemd-networkd[735]: ens192: Gained IPv6LL May 17 00:53:46.283809 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 17 00:53:46.527455 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:53:46.529042 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 17 00:53:46.529238 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 17 00:53:46.529238 ignition[850]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" May 17 00:53:46.529238 ignition[850]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" May 17 00:53:46.529238 ignition[850]: INFO : files: op(11): [started] processing unit "prepare-helm.service" May 17 00:53:46.529238 ignition[850]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:53:46.529238 ignition[850]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:53:46.529238 ignition[850]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" May 17 00:53:46.529238 ignition[850]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" May 17 00:53:46.530509 ignition[850]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:53:46.691039 ignition[850]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:53:46.691284 ignition[850]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" May 17 00:53:46.691284 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:53:46.691595 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:53:46.691595 ignition[850]: INFO : files: files passed May 17 00:53:46.691595 ignition[850]: INFO : Ignition finished successfully May 17 00:53:46.696235 kernel: kauditd_printk_skb: 24 callbacks suppressed May 17 00:53:46.696271 kernel: audit: type=1130 audit(1747443226.692:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.693228 systemd[1]: Finished ignition-files.service. May 17 00:53:46.693797 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:53:46.693911 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:53:46.694293 systemd[1]: Starting ignition-quench.service... May 17 00:53:46.701151 initrd-setup-root-after-ignition[876]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:53:46.701298 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:53:46.701358 systemd[1]: Finished ignition-quench.service. May 17 00:53:46.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.704568 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:53:46.707127 kernel: audit: type=1130 audit(1747443226.700:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.707143 kernel: audit: type=1131 audit(1747443226.700:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.707082 systemd[1]: Reached target ignition-complete.target. May 17 00:53:46.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.707708 systemd[1]: Starting initrd-parse-etc.service... May 17 00:53:46.710183 kernel: audit: type=1130 audit(1747443226.705:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.716657 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:53:46.716898 systemd[1]: Finished initrd-parse-etc.service. May 17 00:53:46.717240 systemd[1]: Reached target initrd-fs.target. May 17 00:53:46.717464 systemd[1]: Reached target initrd.target. May 17 00:53:46.717693 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:53:46.718417 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:53:46.721180 kernel: audit: type=1130 audit(1747443226.715:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.724184 kernel: audit: type=1131 audit(1747443226.715:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.725279 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:53:46.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.725878 systemd[1]: Starting initrd-cleanup.service... May 17 00:53:46.729191 kernel: audit: type=1130 audit(1747443226.724:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.731965 systemd[1]: Stopped target nss-lookup.target. May 17 00:53:46.732146 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:53:46.732536 systemd[1]: Stopped target timers.target. May 17 00:53:46.732724 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:53:46.732807 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:53:46.733160 systemd[1]: Stopped target initrd.target. May 17 00:53:46.735883 kernel: audit: type=1131 audit(1747443226.731:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.735834 systemd[1]: Stopped target basic.target. May 17 00:53:46.735980 systemd[1]: Stopped target ignition-complete.target. May 17 00:53:46.736267 systemd[1]: Stopped target ignition-diskful.target. May 17 00:53:46.736420 systemd[1]: Stopped target initrd-root-device.target. May 17 00:53:46.736638 systemd[1]: Stopped target remote-fs.target. May 17 00:53:46.736786 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:53:46.736962 systemd[1]: Stopped target sysinit.target. May 17 00:53:46.737133 systemd[1]: Stopped target local-fs.target. May 17 00:53:46.737305 systemd[1]: Stopped target local-fs-pre.target. May 17 00:53:46.737473 systemd[1]: Stopped target swap.target. May 17 00:53:46.737624 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:53:46.740233 kernel: audit: type=1131 audit(1747443226.736:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.737691 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:53:46.737883 systemd[1]: Stopped target cryptsetup.target. May 17 00:53:46.742949 kernel: audit: type=1131 audit(1747443226.739:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.740319 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:53:46.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.740381 systemd[1]: Stopped dracut-initqueue.service. May 17 00:53:46.740571 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:53:46.740630 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:53:46.743080 systemd[1]: Stopped target paths.target. May 17 00:53:46.743315 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:53:46.745194 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:53:46.745346 systemd[1]: Stopped target slices.target. May 17 00:53:46.745529 systemd[1]: Stopped target sockets.target. May 17 00:53:46.745717 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:53:46.745807 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:53:46.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.746068 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:53:46.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.746140 systemd[1]: Stopped ignition-files.service. May 17 00:53:46.746813 systemd[1]: Stopping ignition-mount.service... May 17 00:53:46.750266 iscsid[740]: iscsid shutting down. May 17 00:53:46.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.748693 systemd[1]: Stopping iscsid.service... May 17 00:53:46.748877 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:53:46.748962 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:53:46.750976 systemd[1]: Stopping sysroot-boot.service... May 17 00:53:46.751109 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:53:46.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.751234 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:53:46.751546 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:53:46.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.751640 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:53:46.753270 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:53:46.753368 systemd[1]: Stopped iscsid.service. May 17 00:53:46.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.753739 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:53:46.753786 systemd[1]: Closed iscsid.socket. May 17 00:53:46.754393 ignition[889]: INFO : Ignition 2.14.0 May 17 00:53:46.754595 ignition[889]: INFO : Stage: umount May 17 00:53:46.754787 ignition[889]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:53:46.754952 ignition[889]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 17 00:53:46.755420 systemd[1]: Stopping iscsiuio.service... May 17 00:53:46.755645 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:53:46.755711 systemd[1]: Stopped iscsiuio.service. May 17 00:53:46.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.755970 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:53:46.756028 systemd[1]: Finished initrd-cleanup.service. May 17 00:53:46.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.756722 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:53:46.756744 systemd[1]: Closed iscsiuio.socket. May 17 00:53:46.758512 ignition[889]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 17 00:53:46.759815 ignition[889]: INFO : umount: umount passed May 17 00:53:46.759950 ignition[889]: INFO : Ignition finished successfully May 17 00:53:46.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.761346 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:53:46.761405 systemd[1]: Stopped ignition-mount.service. May 17 00:53:46.761584 systemd[1]: Stopped target network.target. May 17 00:53:46.761667 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:53:46.761691 systemd[1]: Stopped ignition-disks.service. May 17 00:53:46.761793 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:53:46.761812 systemd[1]: Stopped ignition-kargs.service. May 17 00:53:46.761915 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:53:46.761935 systemd[1]: Stopped ignition-setup.service. May 17 00:53:46.762085 systemd[1]: Stopping systemd-networkd.service... May 17 00:53:46.762223 systemd[1]: Stopping systemd-resolved.service... May 17 00:53:46.767163 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:53:46.767231 systemd[1]: Stopped systemd-resolved.service. May 17 00:53:46.768075 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:53:46.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.772890 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:53:46.772952 systemd[1]: Stopped systemd-networkd.service. May 17 00:53:46.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.773450 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:53:46.773469 systemd[1]: Closed systemd-networkd.socket. May 17 00:53:46.773955 systemd[1]: Stopping network-cleanup.service... May 17 00:53:46.774048 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:53:46.774077 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:53:46.773000 audit: BPF prog-id=6 op=UNLOAD May 17 00:53:46.774000 audit: BPF prog-id=9 op=UNLOAD May 17 00:53:46.775113 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. May 17 00:53:46.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.775140 systemd[1]: Stopped afterburn-network-kargs.service. May 17 00:53:46.775674 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:53:46.775699 systemd[1]: Stopped systemd-sysctl.service. May 17 00:53:46.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.776097 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:53:46.776120 systemd[1]: Stopped systemd-modules-load.service. May 17 00:53:46.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.778424 systemd[1]: Stopping systemd-udevd.service... May 17 00:53:46.779291 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:53:46.781291 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:53:46.781353 systemd[1]: Stopped network-cleanup.service. May 17 00:53:46.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.783082 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:53:46.783152 systemd[1]: Stopped systemd-udevd.service. May 17 00:53:46.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.783387 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:53:46.783406 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:53:46.783652 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:53:46.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.783669 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:53:46.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.783818 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:53:46.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.783840 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:53:46.783990 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:53:46.784009 systemd[1]: Stopped dracut-cmdline.service. May 17 00:53:46.784167 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:53:46.784211 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:53:46.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.784716 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:53:46.784855 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:53:46.784881 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:53:46.788623 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:53:46.788675 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:53:46.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.831566 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:53:46.831646 systemd[1]: Stopped sysroot-boot.service. May 17 00:53:46.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.831916 systemd[1]: Reached target initrd-switch-root.target. May 17 00:53:46.832088 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:53:46.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:46.832117 systemd[1]: Stopped initrd-setup-root.service. May 17 00:53:46.832715 systemd[1]: Starting initrd-switch-root.service... May 17 00:53:46.839671 systemd[1]: Switching root. May 17 00:53:46.856333 systemd-journald[216]: Journal stopped May 17 00:53:49.929846 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). May 17 00:53:49.929874 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:53:49.929886 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:53:49.929893 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:53:49.929898 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:53:49.929905 kernel: SELinux: policy capability open_perms=1 May 17 00:53:49.929912 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:53:49.929918 kernel: SELinux: policy capability always_check_network=0 May 17 00:53:49.929923 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:53:49.929929 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:53:49.929934 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:53:49.929940 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:53:49.929948 systemd[1]: Successfully loaded SELinux policy in 111.357ms. May 17 00:53:49.929955 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.288ms. May 17 00:53:49.929963 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:53:49.929969 systemd[1]: Detected virtualization vmware. May 17 00:53:49.929977 systemd[1]: Detected architecture x86-64. May 17 00:53:49.929983 systemd[1]: Detected first boot. May 17 00:53:49.929990 systemd[1]: Initializing machine ID from random generator. May 17 00:53:49.929997 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:53:49.930003 systemd[1]: Populated /etc with preset unit settings. May 17 00:53:49.930010 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:53:49.930017 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:53:49.930024 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:53:49.930032 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:53:49.930038 systemd[1]: Stopped initrd-switch-root.service. May 17 00:53:49.930045 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:53:49.930052 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:53:49.930058 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:53:49.930065 systemd[1]: Created slice system-getty.slice. May 17 00:53:49.930071 systemd[1]: Created slice system-modprobe.slice. May 17 00:53:49.930079 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:53:49.930086 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:53:49.930092 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:53:49.930099 systemd[1]: Created slice user.slice. May 17 00:53:49.930105 systemd[1]: Started systemd-ask-password-console.path. May 17 00:53:49.930112 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:53:49.930119 systemd[1]: Set up automount boot.automount. May 17 00:53:49.930125 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:53:49.930133 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:53:49.930140 systemd[1]: Stopped target initrd-fs.target. May 17 00:53:49.930148 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:53:49.930155 systemd[1]: Reached target integritysetup.target. May 17 00:53:49.930162 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:53:49.932381 systemd[1]: Reached target remote-fs.target. May 17 00:53:49.932401 systemd[1]: Reached target slices.target. May 17 00:53:49.932409 systemd[1]: Reached target swap.target. May 17 00:53:49.932416 systemd[1]: Reached target torcx.target. May 17 00:53:49.932425 systemd[1]: Reached target veritysetup.target. May 17 00:53:49.932432 systemd[1]: Listening on systemd-coredump.socket. May 17 00:53:49.932439 systemd[1]: Listening on systemd-initctl.socket. May 17 00:53:49.932446 systemd[1]: Listening on systemd-networkd.socket. May 17 00:53:49.932452 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:53:49.932461 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:53:49.932469 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:53:49.932476 systemd[1]: Mounting dev-hugepages.mount... May 17 00:53:49.932483 systemd[1]: Mounting dev-mqueue.mount... May 17 00:53:49.932489 systemd[1]: Mounting media.mount... May 17 00:53:49.932497 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:49.932504 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:53:49.932511 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:53:49.932518 systemd[1]: Mounting tmp.mount... May 17 00:53:49.932525 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:53:49.932532 systemd[1]: Starting ignition-delete-config.service... May 17 00:53:49.932539 systemd[1]: Starting kmod-static-nodes.service... May 17 00:53:49.932545 systemd[1]: Starting modprobe@configfs.service... May 17 00:53:49.932552 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:53:49.932561 systemd[1]: Starting modprobe@drm.service... May 17 00:53:49.932621 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:53:49.932636 systemd[1]: Starting modprobe@fuse.service... May 17 00:53:49.932645 systemd[1]: Starting modprobe@loop.service... May 17 00:53:49.932652 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:53:49.932659 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:53:49.932666 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:53:49.932674 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:53:49.932681 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:53:49.932688 systemd[1]: Stopped systemd-journald.service. May 17 00:53:49.932694 systemd[1]: Starting systemd-journald.service... May 17 00:53:49.932701 systemd[1]: Starting systemd-modules-load.service... May 17 00:53:49.932709 systemd[1]: Starting systemd-network-generator.service... May 17 00:53:49.932716 systemd[1]: Starting systemd-remount-fs.service... May 17 00:53:49.932722 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:53:49.932729 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:53:49.932736 systemd[1]: Stopped verity-setup.service. May 17 00:53:49.932743 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:49.932750 kernel: fuse: init (API version 7.34) May 17 00:53:49.932756 systemd[1]: Mounted dev-hugepages.mount. May 17 00:53:49.932763 systemd[1]: Mounted dev-mqueue.mount. May 17 00:53:49.932771 systemd[1]: Mounted media.mount. May 17 00:53:49.932778 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:53:49.932785 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:53:49.932792 systemd[1]: Mounted tmp.mount. May 17 00:53:49.932798 systemd[1]: Finished kmod-static-nodes.service. May 17 00:53:49.932805 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:53:49.932812 systemd[1]: Finished modprobe@configfs.service. May 17 00:53:49.932820 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:53:49.932827 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:53:49.932834 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:53:49.932841 systemd[1]: Finished modprobe@drm.service. May 17 00:53:49.932848 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:53:49.932855 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:53:49.932862 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:53:49.932868 systemd[1]: Finished modprobe@fuse.service. May 17 00:53:49.932875 systemd[1]: Finished systemd-modules-load.service. May 17 00:53:49.932882 systemd[1]: Finished systemd-network-generator.service. May 17 00:53:49.932889 systemd[1]: Finished systemd-remount-fs.service. May 17 00:53:49.932897 systemd[1]: Reached target network-pre.target. May 17 00:53:49.932904 kernel: loop: module loaded May 17 00:53:49.932911 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:53:49.932917 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:53:49.932924 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:53:49.932931 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:53:49.932938 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:53:49.932946 systemd[1]: Starting systemd-random-seed.service... May 17 00:53:49.932953 systemd[1]: Starting systemd-sysctl.service... May 17 00:53:49.932960 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:53:49.932967 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:53:49.932974 systemd[1]: Finished modprobe@loop.service. May 17 00:53:49.932984 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:53:49.932992 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:53:49.933000 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:53:49.933007 systemd[1]: Starting systemd-sysusers.service... May 17 00:53:49.933018 systemd-journald[1011]: Journal started May 17 00:53:49.933052 systemd-journald[1011]: Runtime Journal (/run/log/journal/98acff23f47c4eb5b0d576acc3bc9e42) is 4.8M, max 38.8M, 34.0M free. May 17 00:53:47.521000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:53:47.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:53:47.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:53:47.614000 audit: BPF prog-id=10 op=LOAD May 17 00:53:47.615000 audit: BPF prog-id=10 op=UNLOAD May 17 00:53:47.615000 audit: BPF prog-id=11 op=LOAD May 17 00:53:47.615000 audit: BPF prog-id=11 op=UNLOAD May 17 00:53:47.950000 audit[923]: AVC avc: denied { associate } for pid=923 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:53:47.950000 audit[923]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=906 pid=923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:47.950000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:53:47.951000 audit[923]: AVC avc: denied { associate } for pid=923 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:53:47.951000 audit[923]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=906 pid=923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:47.951000 audit: CWD cwd="/" May 17 00:53:47.951000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:47.951000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:47.951000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:53:49.751000 audit: BPF prog-id=12 op=LOAD May 17 00:53:49.751000 audit: BPF prog-id=3 op=UNLOAD May 17 00:53:49.751000 audit: BPF prog-id=13 op=LOAD May 17 00:53:49.751000 audit: BPF prog-id=14 op=LOAD May 17 00:53:49.751000 audit: BPF prog-id=4 op=UNLOAD May 17 00:53:49.751000 audit: BPF prog-id=5 op=UNLOAD May 17 00:53:49.751000 audit: BPF prog-id=15 op=LOAD May 17 00:53:49.751000 audit: BPF prog-id=12 op=UNLOAD May 17 00:53:49.751000 audit: BPF prog-id=16 op=LOAD May 17 00:53:49.751000 audit: BPF prog-id=17 op=LOAD May 17 00:53:49.751000 audit: BPF prog-id=13 op=UNLOAD May 17 00:53:49.751000 audit: BPF prog-id=14 op=UNLOAD May 17 00:53:49.753000 audit: BPF prog-id=18 op=LOAD May 17 00:53:49.753000 audit: BPF prog-id=15 op=UNLOAD May 17 00:53:49.753000 audit: BPF prog-id=19 op=LOAD May 17 00:53:49.753000 audit: BPF prog-id=20 op=LOAD May 17 00:53:49.753000 audit: BPF prog-id=16 op=UNLOAD May 17 00:53:49.753000 audit: BPF prog-id=17 op=UNLOAD May 17 00:53:49.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.763000 audit: BPF prog-id=18 op=UNLOAD May 17 00:53:49.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.935802 systemd[1]: Finished systemd-random-seed.service. May 17 00:53:49.935819 systemd[1]: Started systemd-journald.service. May 17 00:53:49.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.821000 audit: BPF prog-id=21 op=LOAD May 17 00:53:49.822000 audit: BPF prog-id=22 op=LOAD May 17 00:53:49.822000 audit: BPF prog-id=23 op=LOAD May 17 00:53:49.822000 audit: BPF prog-id=19 op=UNLOAD May 17 00:53:49.822000 audit: BPF prog-id=20 op=UNLOAD May 17 00:53:49.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.907000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:53:49.907000 audit[1011]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc5de65840 a2=4000 a3=7ffc5de658dc items=0 ppid=1 pid=1011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:49.907000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:53:49.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:47.947798 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:53:49.751277 systemd[1]: Queued start job for default target multi-user.target. May 17 00:53:47.948265 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:53:49.751286 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:53:47.948282 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:53:49.754941 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:53:47.948314 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:53:49.935533 systemd[1]: Reached target first-boot-complete.target. May 17 00:53:47.948325 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:53:49.937035 systemd[1]: Starting systemd-journal-flush.service... May 17 00:53:47.948364 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:53:49.944320 systemd[1]: Finished systemd-sysctl.service. May 17 00:53:47.948376 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:53:47.948564 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:53:47.948604 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:53:49.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.944642 jq[990]: true May 17 00:53:47.948619 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:53:47.950655 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:53:47.950691 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:53:47.950710 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:53:47.950724 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:53:47.950742 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:53:47.950755 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:53:49.524160 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:53:49.524390 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:53:49.524463 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:53:49.524572 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:53:49.524616 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:53:49.945478 jq[1032]: true May 17 00:53:49.524661 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2025-05-17T00:53:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:53:49.976769 systemd-journald[1011]: Time spent on flushing to /var/log/journal/98acff23f47c4eb5b0d576acc3bc9e42 is 26.639ms for 2010 entries. May 17 00:53:49.976769 systemd-journald[1011]: System Journal (/var/log/journal/98acff23f47c4eb5b0d576acc3bc9e42) is 8.0M, max 584.8M, 576.8M free. May 17 00:53:50.023425 systemd-journald[1011]: Received client request to flush runtime journal. May 17 00:53:49.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.992091 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:53:50.023875 udevadm[1048]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:53:50.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:49.993037 systemd[1]: Starting systemd-udev-settle.service... May 17 00:53:50.023068 systemd[1]: Finished systemd-sysusers.service. May 17 00:53:50.023800 systemd[1]: Finished systemd-journal-flush.service. May 17 00:53:50.078996 ignition[1037]: Ignition 2.14.0 May 17 00:53:50.079154 ignition[1037]: deleting config from guestinfo properties May 17 00:53:50.081612 ignition[1037]: Successfully deleted config May 17 00:53:50.082298 systemd[1]: Finished ignition-delete-config.service. May 17 00:53:50.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.367740 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:53:50.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.367000 audit: BPF prog-id=24 op=LOAD May 17 00:53:50.367000 audit: BPF prog-id=25 op=LOAD May 17 00:53:50.367000 audit: BPF prog-id=7 op=UNLOAD May 17 00:53:50.367000 audit: BPF prog-id=8 op=UNLOAD May 17 00:53:50.368854 systemd[1]: Starting systemd-udevd.service... May 17 00:53:50.380120 systemd-udevd[1055]: Using default interface naming scheme 'v252'. May 17 00:53:50.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.421000 audit: BPF prog-id=26 op=LOAD May 17 00:53:50.421931 systemd[1]: Started systemd-udevd.service. May 17 00:53:50.423243 systemd[1]: Starting systemd-networkd.service... May 17 00:53:50.430000 audit: BPF prog-id=27 op=LOAD May 17 00:53:50.430000 audit: BPF prog-id=28 op=LOAD May 17 00:53:50.430000 audit: BPF prog-id=29 op=LOAD May 17 00:53:50.431852 systemd[1]: Starting systemd-userdbd.service... May 17 00:53:50.447281 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:53:50.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.456718 systemd[1]: Started systemd-userdbd.service. May 17 00:53:50.475183 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:53:50.479182 kernel: ACPI: button: Power Button [PWRF] May 17 00:53:50.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.517108 systemd-networkd[1064]: lo: Link UP May 17 00:53:50.517113 systemd-networkd[1064]: lo: Gained carrier May 17 00:53:50.517401 systemd-networkd[1064]: Enumeration completed May 17 00:53:50.517460 systemd[1]: Started systemd-networkd.service. May 17 00:53:50.517942 systemd-networkd[1064]: ens192: Configuring with /etc/systemd/network/00-vmware.network. May 17 00:53:50.521026 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 17 00:53:50.521150 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 17 00:53:50.522190 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready May 17 00:53:50.522366 systemd-networkd[1064]: ens192: Link UP May 17 00:53:50.522531 systemd-networkd[1064]: ens192: Gained carrier May 17 00:53:50.544582 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 May 17 00:53:50.546081 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc May 17 00:53:50.546163 kernel: Guest personality initialized and is active May 17 00:53:50.549608 kernel: VMCI host device registered (name=vmci, major=10, minor=125) May 17 00:53:50.549638 kernel: Initialized host personality May 17 00:53:50.548000 audit[1069]: AVC avc: denied { confidentiality } for pid=1069 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:53:50.548000 audit[1069]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559ac9d983c0 a1=338ac a2=7f6d513a0bc5 a3=5 items=110 ppid=1055 pid=1069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:50.548000 audit: CWD cwd="/" May 17 00:53:50.548000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=1 name=(null) inode=24674 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=2 name=(null) inode=24674 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=3 name=(null) inode=24675 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=4 name=(null) inode=24674 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=5 name=(null) inode=24676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=6 name=(null) inode=24674 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=7 name=(null) inode=24677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=8 name=(null) inode=24677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=9 name=(null) inode=24678 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=10 name=(null) inode=24677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=11 name=(null) inode=24679 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=12 name=(null) inode=24677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=13 name=(null) inode=24680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=14 name=(null) inode=24677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=15 name=(null) inode=24681 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=16 name=(null) inode=24677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=17 name=(null) inode=24682 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=18 name=(null) inode=24674 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=19 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=20 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=21 name=(null) inode=24684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=22 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=23 name=(null) inode=24685 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=24 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=25 name=(null) inode=24686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=26 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=27 name=(null) inode=24687 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=28 name=(null) inode=24683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=29 name=(null) inode=24688 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=30 name=(null) inode=24674 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=31 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=32 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=33 name=(null) inode=24690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=34 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=35 name=(null) inode=24691 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=36 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=37 name=(null) inode=24692 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=38 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=39 name=(null) inode=24693 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=40 name=(null) inode=24689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=41 name=(null) inode=24694 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=42 name=(null) inode=24674 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=43 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=44 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=45 name=(null) inode=24696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=46 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=47 name=(null) inode=24697 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=48 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=49 name=(null) inode=24698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=50 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=51 name=(null) inode=24699 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=52 name=(null) inode=24695 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=53 name=(null) inode=24700 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=55 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=56 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=57 name=(null) inode=24702 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=58 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=59 name=(null) inode=24703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=60 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=61 name=(null) inode=24704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=62 name=(null) inode=24704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=63 name=(null) inode=24705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=64 name=(null) inode=24704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=65 name=(null) inode=24706 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=66 name=(null) inode=24704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=67 name=(null) inode=24707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=68 name=(null) inode=24704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=69 name=(null) inode=24708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=70 name=(null) inode=24704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=71 name=(null) inode=24709 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=72 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=73 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=74 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=75 name=(null) inode=24711 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=76 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=77 name=(null) inode=24712 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=78 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=79 name=(null) inode=24713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=80 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=81 name=(null) inode=24714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=82 name=(null) inode=24710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=83 name=(null) inode=24715 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=84 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=85 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=86 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=87 name=(null) inode=24717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=88 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=89 name=(null) inode=24718 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=90 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=91 name=(null) inode=24719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=92 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=93 name=(null) inode=24720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=94 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=95 name=(null) inode=24721 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=96 name=(null) inode=24701 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=97 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=98 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=99 name=(null) inode=24723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=100 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=101 name=(null) inode=24724 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=102 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=103 name=(null) inode=24725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=104 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=105 name=(null) inode=24726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=106 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=107 name=(null) inode=24727 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PATH item=109 name=(null) inode=24728 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:50.548000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:53:50.556182 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! May 17 00:53:50.582069 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:53:50.592183 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:53:50.601734 (udev-worker)[1069]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. May 17 00:53:50.613197 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:53:50.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.624429 systemd[1]: Finished systemd-udev-settle.service. May 17 00:53:50.625357 systemd[1]: Starting lvm2-activation-early.service... May 17 00:53:50.644841 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:53:50.666758 systemd[1]: Finished lvm2-activation-early.service. May 17 00:53:50.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.666980 systemd[1]: Reached target cryptsetup.target. May 17 00:53:50.667962 systemd[1]: Starting lvm2-activation.service... May 17 00:53:50.670831 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:53:50.687730 systemd[1]: Finished lvm2-activation.service. May 17 00:53:50.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.687904 systemd[1]: Reached target local-fs-pre.target. May 17 00:53:50.688018 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:53:50.688035 systemd[1]: Reached target local-fs.target. May 17 00:53:50.688125 systemd[1]: Reached target machines.target. May 17 00:53:50.689084 systemd[1]: Starting ldconfig.service... May 17 00:53:50.689752 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:53:50.689785 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:53:50.690519 systemd[1]: Starting systemd-boot-update.service... May 17 00:53:50.691198 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:53:50.691999 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:53:50.692929 systemd[1]: Starting systemd-sysext.service... May 17 00:53:50.696497 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1091 (bootctl) May 17 00:53:50.697113 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:53:50.703924 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:53:50.712851 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:53:50.712947 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:53:50.720605 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:53:50.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.723743 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:53:50.724226 kernel: loop0: detected capacity change from 0 to 221472 May 17 00:53:50.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.727893 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:53:50.757191 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:53:50.776234 kernel: loop1: detected capacity change from 0 to 221472 May 17 00:53:50.798193 (sd-sysext)[1104]: Using extensions 'kubernetes'. May 17 00:53:50.798717 (sd-sysext)[1104]: Merged extensions into '/usr'. May 17 00:53:50.802175 systemd-fsck[1101]: fsck.fat 4.2 (2021-01-31) May 17 00:53:50.802175 systemd-fsck[1101]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:53:50.803246 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:53:50.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.813913 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:53:50.814748 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:53:50.816466 systemd[1]: Starting modprobe@loop.service... May 17 00:53:50.816593 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:53:50.816668 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:53:50.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.817226 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:53:50.817307 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:53:50.817636 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:53:50.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.817698 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:53:50.818868 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:53:50.818936 systemd[1]: Finished modprobe@loop.service. May 17 00:53:50.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.819242 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:53:50.819300 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:53:50.841098 systemd[1]: Mounting boot.mount... May 17 00:53:50.841214 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:50.842057 systemd[1]: Mounting usr-share-oem.mount... May 17 00:53:50.842886 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:50.844984 systemd[1]: Mounted usr-share-oem.mount. May 17 00:53:50.845650 systemd[1]: Finished systemd-sysext.service. May 17 00:53:50.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:50.846528 systemd[1]: Starting ensure-sysext.service... May 17 00:53:50.847260 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:53:50.851305 systemd[1]: Reloading. May 17 00:53:50.879651 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-05-17T00:53:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:53:50.879863 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-05-17T00:53:50Z" level=info msg="torcx already run" May 17 00:53:50.912239 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:53:50.918604 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:53:50.925922 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:53:50.949709 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:53:50.949718 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:53:50.963717 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:53:50.999000 audit: BPF prog-id=30 op=LOAD May 17 00:53:50.999000 audit: BPF prog-id=27 op=UNLOAD May 17 00:53:50.999000 audit: BPF prog-id=31 op=LOAD May 17 00:53:50.999000 audit: BPF prog-id=32 op=LOAD May 17 00:53:50.999000 audit: BPF prog-id=28 op=UNLOAD May 17 00:53:50.999000 audit: BPF prog-id=29 op=UNLOAD May 17 00:53:51.001000 audit: BPF prog-id=33 op=LOAD May 17 00:53:51.001000 audit: BPF prog-id=34 op=LOAD May 17 00:53:51.001000 audit: BPF prog-id=24 op=UNLOAD May 17 00:53:51.001000 audit: BPF prog-id=25 op=UNLOAD May 17 00:53:51.001000 audit: BPF prog-id=35 op=LOAD May 17 00:53:51.001000 audit: BPF prog-id=21 op=UNLOAD May 17 00:53:51.001000 audit: BPF prog-id=36 op=LOAD May 17 00:53:51.002000 audit: BPF prog-id=37 op=LOAD May 17 00:53:51.002000 audit: BPF prog-id=22 op=UNLOAD May 17 00:53:51.002000 audit: BPF prog-id=23 op=UNLOAD May 17 00:53:51.002000 audit: BPF prog-id=38 op=LOAD May 17 00:53:51.002000 audit: BPF prog-id=26 op=UNLOAD May 17 00:53:51.006084 systemd[1]: Mounted boot.mount. May 17 00:53:51.014204 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:51.015246 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:53:51.016166 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:53:51.017629 systemd[1]: Starting modprobe@loop.service... May 17 00:53:51.020422 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:53:51.020511 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:53:51.020586 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:51.021799 systemd[1]: Finished systemd-boot-update.service. May 17 00:53:51.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.022128 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:53:51.022213 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:53:51.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.022962 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:53:51.023033 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:53:51.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.023432 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:53:51.023496 systemd[1]: Finished modprobe@loop.service. May 17 00:53:51.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.023787 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:53:51.023846 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:53:51.024670 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:51.025628 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:53:51.027483 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:53:51.028346 systemd[1]: Starting modprobe@loop.service... May 17 00:53:51.028519 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:53:51.028589 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:53:51.028672 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:51.029131 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:53:51.029240 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:53:51.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.030459 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:53:51.030530 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:53:51.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.030865 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:53:51.030940 systemd[1]: Finished modprobe@loop.service. May 17 00:53:51.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.031219 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:53:51.031277 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:53:51.032911 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:51.033633 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:53:51.034619 systemd[1]: Starting modprobe@drm.service... May 17 00:53:51.036101 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:53:51.036865 systemd[1]: Starting modprobe@loop.service... May 17 00:53:51.037029 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:53:51.037105 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:53:51.038009 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:53:51.038201 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:53:51.038853 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:53:51.039141 systemd[1]: Finished modprobe@drm.service. May 17 00:53:51.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.039989 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:53:51.040069 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:53:51.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.040452 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:53:51.041464 systemd[1]: Finished ensure-sysext.service. May 17 00:53:51.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.041729 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:53:51.041799 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:53:51.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.043552 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:53:51.043622 systemd[1]: Finished modprobe@loop.service. May 17 00:53:51.043769 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:53:51.086096 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:53:51.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.087384 systemd[1]: Starting audit-rules.service... May 17 00:53:51.088317 systemd[1]: Starting clean-ca-certificates.service... May 17 00:53:51.089211 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:53:51.088000 audit: BPF prog-id=39 op=LOAD May 17 00:53:51.090679 systemd[1]: Starting systemd-resolved.service... May 17 00:53:51.090000 audit: BPF prog-id=40 op=LOAD May 17 00:53:51.092326 systemd[1]: Starting systemd-timesyncd.service... May 17 00:53:51.093842 systemd[1]: Starting systemd-update-utmp.service... May 17 00:53:51.100512 systemd[1]: Finished clean-ca-certificates.service. May 17 00:53:51.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.100694 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:53:51.108000 audit[1209]: SYSTEM_BOOT pid=1209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:53:51.111536 systemd[1]: Finished systemd-update-utmp.service. May 17 00:53:51.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.127904 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:53:51.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:53:51.141000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:53:51.141000 audit[1224]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff44348c10 a2=420 a3=0 items=0 ppid=1204 pid=1224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:51.141000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:53:51.142937 augenrules[1224]: No rules May 17 00:53:51.143580 systemd[1]: Finished audit-rules.service. May 17 00:53:51.147636 systemd[1]: Started systemd-timesyncd.service. May 17 00:53:51.147821 systemd[1]: Reached target time-set.target. May 17 00:53:51.161863 ldconfig[1090]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:53:51.164625 systemd-resolved[1207]: Positive Trust Anchors: May 17 00:53:51.164807 systemd-resolved[1207]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:53:51.164867 systemd-resolved[1207]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:53:51.184118 systemd[1]: Finished ldconfig.service. May 17 00:53:51.185239 systemd[1]: Starting systemd-update-done.service... May 17 00:53:51.192300 systemd[1]: Finished systemd-update-done.service. May 17 00:53:51.197152 systemd-resolved[1207]: Defaulting to hostname 'linux'. May 17 00:53:51.198143 systemd[1]: Started systemd-resolved.service. May 17 00:53:51.198317 systemd[1]: Reached target network.target. May 17 00:53:51.198424 systemd[1]: Reached target nss-lookup.target. May 17 00:53:51.198525 systemd[1]: Reached target sysinit.target. May 17 00:53:51.198661 systemd[1]: Started motdgen.path. May 17 00:53:51.198764 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:53:51.198963 systemd[1]: Started logrotate.timer. May 17 00:53:51.199092 systemd[1]: Started mdadm.timer. May 17 00:53:51.199221 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:53:51.199319 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:53:51.199341 systemd[1]: Reached target paths.target. May 17 00:53:51.199423 systemd[1]: Reached target timers.target. May 17 00:53:51.199696 systemd[1]: Listening on dbus.socket. May 17 00:53:51.200562 systemd[1]: Starting docker.socket... May 17 00:53:51.202891 systemd[1]: Listening on sshd.socket. May 17 00:53:51.203053 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:53:51.203331 systemd[1]: Listening on docker.socket. May 17 00:53:51.203474 systemd[1]: Reached target sockets.target. May 17 00:53:51.203569 systemd[1]: Reached target basic.target. May 17 00:53:51.203682 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:53:51.203701 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:53:51.204485 systemd[1]: Starting containerd.service... May 17 00:53:51.205389 systemd[1]: Starting dbus.service... May 17 00:53:51.206809 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:53:51.207744 systemd[1]: Starting extend-filesystems.service... May 17 00:53:51.209377 jq[1235]: false May 17 00:53:51.208042 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:53:51.208983 systemd[1]: Starting motdgen.service... May 17 00:53:51.212135 systemd[1]: Starting prepare-helm.service... May 17 00:53:51.213057 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:53:51.213964 systemd[1]: Starting sshd-keygen.service... May 17 00:53:51.215904 systemd[1]: Starting systemd-logind.service... May 17 00:53:51.216839 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:53:51.216883 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:53:51.217328 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:53:51.217689 systemd[1]: Starting update-engine.service... May 17 00:53:51.218574 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:53:51.219824 systemd[1]: Starting vmtoolsd.service... May 17 00:53:51.221269 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:53:51.222224 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:53:51.227217 jq[1244]: true May 17 00:53:51.231711 jq[1253]: true May 17 00:55:12.888257 systemd-timesyncd[1208]: Contacted time server 144.202.0.197:123 (0.flatcar.pool.ntp.org). May 17 00:55:12.888507 systemd-resolved[1207]: Clock change detected. Flushing caches. May 17 00:55:12.892302 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:55:12.892405 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:55:12.892595 systemd-timesyncd[1208]: Initial clock synchronization to Sat 2025-05-17 00:55:12.888060 UTC. May 17 00:55:12.909155 systemd[1]: Started vmtoolsd.service. May 17 00:55:12.913417 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:55:12.913521 systemd[1]: Finished motdgen.service. May 17 00:55:12.934731 extend-filesystems[1236]: Found loop1 May 17 00:55:12.934731 extend-filesystems[1236]: Found sda May 17 00:55:12.934731 extend-filesystems[1236]: Found sda1 May 17 00:55:12.934731 extend-filesystems[1236]: Found sda2 May 17 00:55:12.934731 extend-filesystems[1236]: Found sda3 May 17 00:55:12.934731 extend-filesystems[1236]: Found usr May 17 00:55:12.934731 extend-filesystems[1236]: Found sda4 May 17 00:55:12.934731 extend-filesystems[1236]: Found sda6 May 17 00:55:12.934731 extend-filesystems[1236]: Found sda7 May 17 00:55:12.934731 extend-filesystems[1236]: Found sda9 May 17 00:55:12.934731 extend-filesystems[1236]: Checking size of /dev/sda9 May 17 00:55:12.959550 tar[1247]: linux-amd64/helm May 17 00:55:12.964029 bash[1270]: Updated "/home/core/.ssh/authorized_keys" May 17 00:55:12.964464 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:55:12.970789 systemd-logind[1241]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:55:12.971285 systemd-logind[1241]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:55:12.977822 extend-filesystems[1236]: Old size kept for /dev/sda9 May 17 00:55:12.977822 extend-filesystems[1236]: Found sr0 May 17 00:55:12.978089 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:55:12.979108 systemd[1]: Finished extend-filesystems.service. May 17 00:55:12.981693 systemd-logind[1241]: New seat seat0. May 17 00:55:12.986732 env[1272]: time="2025-05-17T00:55:12.986708715Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:55:12.987892 kernel: NET: Registered PF_VSOCK protocol family May 17 00:55:13.005194 update_engine[1242]: I0517 00:55:13.004570 1242 main.cc:92] Flatcar Update Engine starting May 17 00:55:13.005825 dbus-daemon[1234]: [system] SELinux support is enabled May 17 00:55:13.005948 systemd[1]: Started dbus.service. May 17 00:55:13.007204 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:55:13.007598 dbus-daemon[1234]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:55:13.007220 systemd[1]: Reached target system-config.target. May 17 00:55:13.007340 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:55:13.007350 systemd[1]: Reached target user-config.target. May 17 00:55:13.007466 systemd[1]: Started systemd-logind.service. May 17 00:55:13.009163 update_engine[1242]: I0517 00:55:13.009104 1242 update_check_scheduler.cc:74] Next update check in 8m31s May 17 00:55:13.009575 systemd[1]: Started update-engine.service. May 17 00:55:13.011108 systemd[1]: Started locksmithd.service. May 17 00:55:13.052837 env[1272]: time="2025-05-17T00:55:13.052786670Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:55:13.052989 env[1272]: time="2025-05-17T00:55:13.052978049Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.053792531Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.053808097Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.053906531Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.053916260Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.053923638Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.053929310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.053968862Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.054108639Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.054176398Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:55:13.054299 env[1272]: time="2025-05-17T00:55:13.054185812Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:55:13.054476 env[1272]: time="2025-05-17T00:55:13.054212280Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:55:13.054476 env[1272]: time="2025-05-17T00:55:13.054220521Z" level=info msg="metadata content store policy set" policy=shared May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060207533Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060231381Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060240057Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060263503Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060272983Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060280377Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060287267Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060294623Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060302491Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060309855Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060316983Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060323550Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060380980Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:55:13.060904 env[1272]: time="2025-05-17T00:55:13.060426212Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060557663Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060572513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060580188Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060611277Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060619480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060626129Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060633340Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060640226Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060647277Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060653499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060659444Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060668135Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060735836Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060745151Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061218 env[1272]: time="2025-05-17T00:55:13.060751610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:55:13.061442 env[1272]: time="2025-05-17T00:55:13.060758239Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:55:13.061442 env[1272]: time="2025-05-17T00:55:13.060766262Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:55:13.061442 env[1272]: time="2025-05-17T00:55:13.060772598Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:55:13.061442 env[1272]: time="2025-05-17T00:55:13.060782867Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:55:13.061442 env[1272]: time="2025-05-17T00:55:13.060808554Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:55:13.063384 systemd[1]: Started containerd.service. May 17 00:55:13.066979 env[1272]: time="2025-05-17T00:55:13.062685865Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:55:13.066979 env[1272]: time="2025-05-17T00:55:13.062732754Z" level=info msg="Connect containerd service" May 17 00:55:13.066979 env[1272]: time="2025-05-17T00:55:13.062760035Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:55:13.066979 env[1272]: time="2025-05-17T00:55:13.063119612Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:55:13.066979 env[1272]: time="2025-05-17T00:55:13.063282061Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:55:13.066979 env[1272]: time="2025-05-17T00:55:13.063309133Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:55:13.066979 env[1272]: time="2025-05-17T00:55:13.063345885Z" level=info msg="containerd successfully booted in 0.078260s" May 17 00:55:13.074933 env[1272]: time="2025-05-17T00:55:13.074898055Z" level=info msg="Start subscribing containerd event" May 17 00:55:13.075018 env[1272]: time="2025-05-17T00:55:13.075004818Z" level=info msg="Start recovering state" May 17 00:55:13.075113 env[1272]: time="2025-05-17T00:55:13.075104443Z" level=info msg="Start event monitor" May 17 00:55:13.075178 env[1272]: time="2025-05-17T00:55:13.075168271Z" level=info msg="Start snapshots syncer" May 17 00:55:13.075231 env[1272]: time="2025-05-17T00:55:13.075221784Z" level=info msg="Start cni network conf syncer for default" May 17 00:55:13.075274 env[1272]: time="2025-05-17T00:55:13.075264603Z" level=info msg="Start streaming server" May 17 00:55:13.328270 tar[1247]: linux-amd64/LICENSE May 17 00:55:13.328270 tar[1247]: linux-amd64/README.md May 17 00:55:13.331424 systemd[1]: Finished prepare-helm.service. May 17 00:55:13.417991 locksmithd[1293]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:55:13.553100 sshd_keygen[1254]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:55:13.567096 systemd[1]: Finished sshd-keygen.service. May 17 00:55:13.568374 systemd[1]: Starting issuegen.service... May 17 00:55:13.571782 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:55:13.571891 systemd[1]: Finished issuegen.service. May 17 00:55:13.572968 systemd[1]: Starting systemd-user-sessions.service... May 17 00:55:13.580008 systemd[1]: Finished systemd-user-sessions.service. May 17 00:55:13.580966 systemd[1]: Started getty@tty1.service. May 17 00:55:13.581766 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:55:13.582006 systemd[1]: Reached target getty.target. May 17 00:55:13.634067 systemd-networkd[1064]: ens192: Gained IPv6LL May 17 00:55:13.635587 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:55:13.636079 systemd[1]: Reached target network-online.target. May 17 00:55:13.637824 systemd[1]: Starting kubelet.service... May 17 00:55:14.950790 systemd[1]: Started kubelet.service. May 17 00:55:14.951106 systemd[1]: Reached target multi-user.target. May 17 00:55:14.952001 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:55:14.956223 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:55:14.956303 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:55:14.956465 systemd[1]: Startup finished in 899ms (kernel) + 5.734s (initrd) + 6.018s (userspace) = 12.652s. May 17 00:55:14.987591 login[1360]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 00:55:14.989142 login[1361]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:55:14.997410 systemd[1]: Created slice user-500.slice. May 17 00:55:14.998205 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:55:15.001958 systemd-logind[1241]: New session 2 of user core. May 17 00:55:15.004441 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:55:15.005384 systemd[1]: Starting user@500.service... May 17 00:55:15.008096 (systemd)[1369]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:55:15.085763 systemd[1369]: Queued start job for default target default.target. May 17 00:55:15.086757 systemd[1369]: Reached target paths.target. May 17 00:55:15.086856 systemd[1369]: Reached target sockets.target. May 17 00:55:15.086957 systemd[1369]: Reached target timers.target. May 17 00:55:15.087042 systemd[1369]: Reached target basic.target. May 17 00:55:15.087156 systemd[1369]: Reached target default.target. May 17 00:55:15.087193 systemd[1]: Started user@500.service. May 17 00:55:15.087551 systemd[1369]: Startup finished in 75ms. May 17 00:55:15.088137 systemd[1]: Started session-2.scope. May 17 00:55:15.539657 kubelet[1366]: E0517 00:55:15.539632 1366 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:55:15.540755 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:55:15.540832 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:55:15.987838 login[1360]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:55:15.990583 systemd-logind[1241]: New session 1 of user core. May 17 00:55:15.991054 systemd[1]: Started session-1.scope. May 17 00:55:25.791391 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:55:25.791638 systemd[1]: Stopped kubelet.service. May 17 00:55:25.792891 systemd[1]: Starting kubelet.service... May 17 00:55:25.853869 systemd[1]: Started kubelet.service. May 17 00:55:25.900895 kubelet[1398]: E0517 00:55:25.900851 1398 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:55:25.902943 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:55:25.903016 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:55:35.913598 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:55:35.913746 systemd[1]: Stopped kubelet.service. May 17 00:55:35.914982 systemd[1]: Starting kubelet.service... May 17 00:55:36.185321 systemd[1]: Started kubelet.service. May 17 00:55:36.241297 kubelet[1407]: E0517 00:55:36.241270 1407 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:55:36.242574 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:55:36.242663 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:55:43.088621 systemd[1]: Created slice system-sshd.slice. May 17 00:55:43.089422 systemd[1]: Started sshd@0-139.178.70.101:22-147.75.109.163:36520.service. May 17 00:55:43.128816 sshd[1413]: Accepted publickey for core from 147.75.109.163 port 36520 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:55:43.129556 sshd[1413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:55:43.132521 systemd[1]: Started session-3.scope. May 17 00:55:43.132798 systemd-logind[1241]: New session 3 of user core. May 17 00:55:43.179775 systemd[1]: Started sshd@1-139.178.70.101:22-147.75.109.163:36522.service. May 17 00:55:43.211529 sshd[1418]: Accepted publickey for core from 147.75.109.163 port 36522 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:55:43.212325 sshd[1418]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:55:43.215248 systemd[1]: Started session-4.scope. May 17 00:55:43.216012 systemd-logind[1241]: New session 4 of user core. May 17 00:55:43.265979 sshd[1418]: pam_unix(sshd:session): session closed for user core May 17 00:55:43.267826 systemd[1]: Started sshd@2-139.178.70.101:22-147.75.109.163:36524.service. May 17 00:55:43.269380 systemd-logind[1241]: Session 4 logged out. Waiting for processes to exit. May 17 00:55:43.269443 systemd[1]: sshd@1-139.178.70.101:22-147.75.109.163:36522.service: Deactivated successfully. May 17 00:55:43.269845 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:55:43.270341 systemd-logind[1241]: Removed session 4. May 17 00:55:43.298389 sshd[1423]: Accepted publickey for core from 147.75.109.163 port 36524 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:55:43.299142 sshd[1423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:55:43.301635 systemd-logind[1241]: New session 5 of user core. May 17 00:55:43.302085 systemd[1]: Started session-5.scope. May 17 00:55:43.349336 sshd[1423]: pam_unix(sshd:session): session closed for user core May 17 00:55:43.351334 systemd[1]: sshd@2-139.178.70.101:22-147.75.109.163:36524.service: Deactivated successfully. May 17 00:55:43.351681 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:55:43.352043 systemd-logind[1241]: Session 5 logged out. Waiting for processes to exit. May 17 00:55:43.352681 systemd[1]: Started sshd@3-139.178.70.101:22-147.75.109.163:36538.service. May 17 00:55:43.353240 systemd-logind[1241]: Removed session 5. May 17 00:55:43.382224 sshd[1430]: Accepted publickey for core from 147.75.109.163 port 36538 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:55:43.382987 sshd[1430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:55:43.385544 systemd-logind[1241]: New session 6 of user core. May 17 00:55:43.386023 systemd[1]: Started session-6.scope. May 17 00:55:43.435855 sshd[1430]: pam_unix(sshd:session): session closed for user core May 17 00:55:43.437885 systemd[1]: sshd@3-139.178.70.101:22-147.75.109.163:36538.service: Deactivated successfully. May 17 00:55:43.438238 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:55:43.438591 systemd-logind[1241]: Session 6 logged out. Waiting for processes to exit. May 17 00:55:43.439249 systemd[1]: Started sshd@4-139.178.70.101:22-147.75.109.163:36552.service. May 17 00:55:43.439826 systemd-logind[1241]: Removed session 6. May 17 00:55:43.468961 sshd[1436]: Accepted publickey for core from 147.75.109.163 port 36552 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:55:43.469720 sshd[1436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:55:43.472303 systemd-logind[1241]: New session 7 of user core. May 17 00:55:43.472760 systemd[1]: Started session-7.scope. May 17 00:55:43.531462 sudo[1439]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:55:43.531601 sudo[1439]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:55:43.537896 dbus-daemon[1234]: нl\x89PV: received setenforce notice (enforcing=-943720112) May 17 00:55:43.537987 sudo[1439]: pam_unix(sudo:session): session closed for user root May 17 00:55:43.539448 sshd[1436]: pam_unix(sshd:session): session closed for user core May 17 00:55:43.541677 systemd[1]: Started sshd@5-139.178.70.101:22-147.75.109.163:36554.service. May 17 00:55:43.541989 systemd[1]: sshd@4-139.178.70.101:22-147.75.109.163:36552.service: Deactivated successfully. May 17 00:55:43.542424 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:55:43.542980 systemd-logind[1241]: Session 7 logged out. Waiting for processes to exit. May 17 00:55:43.543575 systemd-logind[1241]: Removed session 7. May 17 00:55:43.571838 sshd[1442]: Accepted publickey for core from 147.75.109.163 port 36554 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:55:43.572711 sshd[1442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:55:43.575762 systemd[1]: Started session-8.scope. May 17 00:55:43.575972 systemd-logind[1241]: New session 8 of user core. May 17 00:55:43.624202 sudo[1447]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:55:43.624336 sudo[1447]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:55:43.626294 sudo[1447]: pam_unix(sudo:session): session closed for user root May 17 00:55:43.629187 sudo[1446]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:55:43.629318 sudo[1446]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:55:43.634869 systemd[1]: Stopping audit-rules.service... May 17 00:55:43.635000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:55:43.636058 auditctl[1450]: No rules May 17 00:55:43.638512 kernel: kauditd_printk_skb: 296 callbacks suppressed May 17 00:55:43.638558 kernel: audit: type=1305 audit(1747443343.635:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:55:43.638577 kernel: audit: type=1300 audit(1747443343.635:217): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe9b253530 a2=420 a3=0 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.635000 audit[1450]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe9b253530 a2=420 a3=0 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.636287 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:55:43.636377 systemd[1]: Stopped audit-rules.service. May 17 00:55:43.638400 systemd[1]: Starting audit-rules.service... May 17 00:55:43.635000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:55:43.646873 kernel: audit: type=1327 audit(1747443343.635:217): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:55:43.646912 kernel: audit: type=1131 audit(1747443343.635:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:43.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:43.653643 augenrules[1467]: No rules May 17 00:55:43.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:43.654182 systemd[1]: Finished audit-rules.service. May 17 00:55:43.654727 sudo[1446]: pam_unix(sudo:session): session closed for user root May 17 00:55:43.657926 kernel: audit: type=1130 audit(1747443343.653:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:43.658163 sshd[1442]: pam_unix(sshd:session): session closed for user core May 17 00:55:43.653000 audit[1446]: USER_END pid=1446 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:55:43.661014 systemd[1]: Started sshd@6-139.178.70.101:22-147.75.109.163:36564.service. May 17 00:55:43.664114 kernel: audit: type=1106 audit(1747443343.653:220): pid=1446 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:55:43.653000 audit[1446]: CRED_DISP pid=1446 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:55:43.665093 systemd[1]: sshd@5-139.178.70.101:22-147.75.109.163:36554.service: Deactivated successfully. May 17 00:55:43.665519 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:55:43.667899 kernel: audit: type=1104 audit(1747443343.653:221): pid=1446 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:55:43.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:36564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:43.674839 kernel: audit: type=1130 audit(1747443343.659:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:36564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:43.674888 kernel: audit: type=1106 audit(1747443343.663:223): pid=1442 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:55:43.663000 audit[1442]: USER_END pid=1442 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:55:43.663000 audit[1442]: CRED_DISP pid=1442 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:55:43.675045 systemd-logind[1241]: Session 8 logged out. Waiting for processes to exit. May 17 00:55:43.675593 systemd-logind[1241]: Removed session 8. May 17 00:55:43.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.101:22-147.75.109.163:36554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:43.678897 kernel: audit: type=1104 audit(1747443343.663:224): pid=1442 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:55:43.694000 audit[1472]: USER_ACCT pid=1472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:55:43.695236 sshd[1472]: Accepted publickey for core from 147.75.109.163 port 36564 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:55:43.694000 audit[1472]: CRED_ACQ pid=1472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:55:43.694000 audit[1472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd59b47b00 a2=3 a3=0 items=0 ppid=1 pid=1472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.694000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:55:43.696042 sshd[1472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:55:43.699022 systemd[1]: Started session-9.scope. May 17 00:55:43.699243 systemd-logind[1241]: New session 9 of user core. May 17 00:55:43.701000 audit[1472]: USER_START pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:55:43.702000 audit[1475]: CRED_ACQ pid=1475 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:55:43.748721 sudo[1476]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:55:43.748901 sudo[1476]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:55:43.747000 audit[1476]: USER_ACCT pid=1476 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:55:43.747000 audit[1476]: CRED_REFR pid=1476 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:55:43.749000 audit[1476]: USER_START pid=1476 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:55:43.763864 systemd[1]: Starting docker.service... May 17 00:55:43.789281 env[1486]: time="2025-05-17T00:55:43.789251976Z" level=info msg="Starting up" May 17 00:55:43.790560 env[1486]: time="2025-05-17T00:55:43.790544818Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:55:43.790560 env[1486]: time="2025-05-17T00:55:43.790557695Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:55:43.790610 env[1486]: time="2025-05-17T00:55:43.790570477Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:55:43.790610 env[1486]: time="2025-05-17T00:55:43.790577087Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:55:43.791912 env[1486]: time="2025-05-17T00:55:43.791896669Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:55:43.791912 env[1486]: time="2025-05-17T00:55:43.791908398Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:55:43.791978 env[1486]: time="2025-05-17T00:55:43.791916230Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:55:43.791978 env[1486]: time="2025-05-17T00:55:43.791921050Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:55:43.795195 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport69882551-merged.mount: Deactivated successfully. May 17 00:55:43.811425 env[1486]: time="2025-05-17T00:55:43.811401108Z" level=info msg="Loading containers: start." May 17 00:55:43.867000 audit[1516]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.867000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffea7e513c0 a2=0 a3=7ffea7e513ac items=0 ppid=1486 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.867000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:55:43.868000 audit[1518]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.868000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdd99a2120 a2=0 a3=7ffdd99a210c items=0 ppid=1486 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:55:43.869000 audit[1520]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.869000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff84804df0 a2=0 a3=7fff84804ddc items=0 ppid=1486 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.869000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:55:43.871000 audit[1522]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.871000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdadd4acb0 a2=0 a3=7ffdadd4ac9c items=0 ppid=1486 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:55:43.873000 audit[1524]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.873000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe76a5ecb0 a2=0 a3=7ffe76a5ec9c items=0 ppid=1486 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.873000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:55:43.888000 audit[1529]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.888000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdce946e00 a2=0 a3=7ffdce946dec items=0 ppid=1486 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.888000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:55:43.891000 audit[1531]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.891000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc17aeda0 a2=0 a3=7ffcc17aed8c items=0 ppid=1486 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.891000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:55:43.893000 audit[1533]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.893000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdd3c825f0 a2=0 a3=7ffdd3c825dc items=0 ppid=1486 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:55:43.894000 audit[1535]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.894000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdf12e37a0 a2=0 a3=7ffdf12e378c items=0 ppid=1486 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.894000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:55:43.898000 audit[1539]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.898000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcdce4d790 a2=0 a3=7ffcdce4d77c items=0 ppid=1486 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.898000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:55:43.903000 audit[1540]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.903000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff7d6246e0 a2=0 a3=7fff7d6246cc items=0 ppid=1486 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.903000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:55:43.912899 kernel: Initializing XFRM netlink socket May 17 00:55:43.939174 env[1486]: time="2025-05-17T00:55:43.939145412Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:55:43.952000 audit[1548]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.952000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe6ecfd700 a2=0 a3=7ffe6ecfd6ec items=0 ppid=1486 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.952000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:55:43.959000 audit[1551]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.959000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc4c29af30 a2=0 a3=7ffc4c29af1c items=0 ppid=1486 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:55:43.961000 audit[1554]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.961000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe73f0a1d0 a2=0 a3=7ffe73f0a1bc items=0 ppid=1486 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:55:43.963000 audit[1556]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.963000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe50a1c270 a2=0 a3=7ffe50a1c25c items=0 ppid=1486 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:55:43.964000 audit[1558]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.964000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc5a73edc0 a2=0 a3=7ffc5a73edac items=0 ppid=1486 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:55:43.965000 audit[1560]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1560 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.965000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc9b003d00 a2=0 a3=7ffc9b003cec items=0 ppid=1486 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.965000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:55:43.967000 audit[1562]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.967000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff5cf01330 a2=0 a3=7fff5cf0131c items=0 ppid=1486 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.967000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:55:43.973000 audit[1565]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.973000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffde38afcb0 a2=0 a3=7ffde38afc9c items=0 ppid=1486 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.973000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:55:43.974000 audit[1568]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.974000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff7fb8c2d0 a2=0 a3=7fff7fb8c2bc items=0 ppid=1486 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:55:43.976000 audit[1570]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.976000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdba2e5310 a2=0 a3=7ffdba2e52fc items=0 ppid=1486 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:55:43.977000 audit[1572]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.977000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdeba207a0 a2=0 a3=7ffdeba2078c items=0 ppid=1486 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.977000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:55:43.978684 systemd-networkd[1064]: docker0: Link UP May 17 00:55:43.982000 audit[1576]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.982000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca6f453b0 a2=0 a3=7ffca6f4539c items=0 ppid=1486 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:55:43.986000 audit[1577]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:55:43.986000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff1672a0e0 a2=0 a3=7fff1672a0cc items=0 ppid=1486 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:55:43.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:55:43.987789 env[1486]: time="2025-05-17T00:55:43.987765928Z" level=info msg="Loading containers: done." May 17 00:55:43.996103 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2469461195-merged.mount: Deactivated successfully. May 17 00:55:44.002982 env[1486]: time="2025-05-17T00:55:44.002959512Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:55:44.003194 env[1486]: time="2025-05-17T00:55:44.003179728Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:55:44.003295 env[1486]: time="2025-05-17T00:55:44.003286197Z" level=info msg="Daemon has completed initialization" May 17 00:55:44.010642 systemd[1]: Started docker.service. May 17 00:55:44.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:44.014816 env[1486]: time="2025-05-17T00:55:44.014785093Z" level=info msg="API listen on /run/docker.sock" May 17 00:55:45.414918 env[1272]: time="2025-05-17T00:55:45.414864228Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\"" May 17 00:55:46.044853 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount804874492.mount: Deactivated successfully. May 17 00:55:46.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:46.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:46.413500 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:55:46.413621 systemd[1]: Stopped kubelet.service. May 17 00:55:46.414833 systemd[1]: Starting kubelet.service... May 17 00:55:46.588022 systemd[1]: Started kubelet.service. May 17 00:55:46.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:46.628158 kubelet[1614]: E0517 00:55:46.628133 1614 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:55:46.629305 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:55:46.629383 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:55:46.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:55:47.485724 env[1272]: time="2025-05-17T00:55:47.485690032Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:47.487436 env[1272]: time="2025-05-17T00:55:47.487421858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:47.488380 env[1272]: time="2025-05-17T00:55:47.488367694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:47.489355 env[1272]: time="2025-05-17T00:55:47.489337448Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5b68f0df22013422dc8fb9ddfcff513eb6fc92f9dbf8aae41555c895efef5a20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:47.489949 env[1272]: time="2025-05-17T00:55:47.489869669Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\" returns image reference \"sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1\"" May 17 00:55:47.490244 env[1272]: time="2025-05-17T00:55:47.490228049Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\"" May 17 00:55:49.749668 env[1272]: time="2025-05-17T00:55:49.749637451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:49.772215 env[1272]: time="2025-05-17T00:55:49.772181286Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:49.797506 env[1272]: time="2025-05-17T00:55:49.797469296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:49.811459 env[1272]: time="2025-05-17T00:55:49.811424963Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:be9e7987d323b38a12e28436cff6d6ec6fc31ffdd3ea11eaa9d74852e9d31248,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:49.812006 env[1272]: time="2025-05-17T00:55:49.811986792Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\" returns image reference \"sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2\"" May 17 00:55:49.812350 env[1272]: time="2025-05-17T00:55:49.812337613Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\"" May 17 00:55:51.199514 env[1272]: time="2025-05-17T00:55:51.199475870Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:51.201212 env[1272]: time="2025-05-17T00:55:51.201191119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:51.202575 env[1272]: time="2025-05-17T00:55:51.202554661Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:51.203952 env[1272]: time="2025-05-17T00:55:51.203933153Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:eb358c7346bb17ab2c639c3ff8ab76a147dec7ae609f5c0c2800233e42253ed1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:51.204540 env[1272]: time="2025-05-17T00:55:51.204519846Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\" returns image reference \"sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3\"" May 17 00:55:51.204918 env[1272]: time="2025-05-17T00:55:51.204901734Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:55:52.802830 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3713231093.mount: Deactivated successfully. May 17 00:55:53.242306 env[1272]: time="2025-05-17T00:55:53.242259009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:53.243007 env[1272]: time="2025-05-17T00:55:53.242989261Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:53.243748 env[1272]: time="2025-05-17T00:55:53.243733084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:53.244578 env[1272]: time="2025-05-17T00:55:53.244562260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:53.244912 env[1272]: time="2025-05-17T00:55:53.244861452Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\"" May 17 00:55:53.245299 env[1272]: time="2025-05-17T00:55:53.245285216Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:55:54.368238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2530776185.mount: Deactivated successfully. May 17 00:55:55.845972 env[1272]: time="2025-05-17T00:55:55.845934725Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:55.854875 env[1272]: time="2025-05-17T00:55:55.854849556Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:55.857936 env[1272]: time="2025-05-17T00:55:55.857918522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:55.858999 env[1272]: time="2025-05-17T00:55:55.858976370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:55.859860 env[1272]: time="2025-05-17T00:55:55.859838436Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:55:55.860253 env[1272]: time="2025-05-17T00:55:55.860231399Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:55:56.392075 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1705008978.mount: Deactivated successfully. May 17 00:55:56.417622 env[1272]: time="2025-05-17T00:55:56.417580094Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:56.422404 env[1272]: time="2025-05-17T00:55:56.422372242Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:56.425946 env[1272]: time="2025-05-17T00:55:56.425921389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:56.427322 env[1272]: time="2025-05-17T00:55:56.427301957Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:55:56.427808 env[1272]: time="2025-05-17T00:55:56.427784885Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:55:56.428661 env[1272]: time="2025-05-17T00:55:56.428642003Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 17 00:55:56.663565 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:55:56.670372 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 00:55:56.670443 kernel: audit: type=1130 audit(1747443356.662:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:56.670468 kernel: audit: type=1131 audit(1747443356.662:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:56.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:56.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:56.663707 systemd[1]: Stopped kubelet.service. May 17 00:55:56.664791 systemd[1]: Starting kubelet.service... May 17 00:55:56.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:56.742298 systemd[1]: Started kubelet.service. May 17 00:55:56.745906 kernel: audit: type=1130 audit(1747443356.741:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:55:56.823007 kubelet[1624]: E0517 00:55:56.822966 1624 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:55:56.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:55:56.824124 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:55:56.824197 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:55:56.827904 kernel: audit: type=1131 audit(1747443356.823:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:55:57.449682 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2747234981.mount: Deactivated successfully. May 17 00:55:58.319496 update_engine[1242]: I0517 00:55:58.319236 1242 update_attempter.cc:509] Updating boot flags... May 17 00:55:59.965377 env[1272]: time="2025-05-17T00:55:59.965334700Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:00.005015 env[1272]: time="2025-05-17T00:56:00.004988438Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:00.037974 env[1272]: time="2025-05-17T00:56:00.037940101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:00.057476 env[1272]: time="2025-05-17T00:56:00.057446175Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:00.058051 env[1272]: time="2025-05-17T00:56:00.058033521Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 17 00:56:01.972823 systemd[1]: Stopped kubelet.service. May 17 00:56:01.976029 kernel: audit: type=1130 audit(1747443361.972:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:01.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:01.975956 systemd[1]: Starting kubelet.service... May 17 00:56:01.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:01.978899 kernel: audit: type=1131 audit(1747443361.972:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:02.002162 systemd[1]: Reloading. May 17 00:56:02.065626 /usr/lib/systemd/system-generators/torcx-generator[1687]: time="2025-05-17T00:56:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:56:02.065646 /usr/lib/systemd/system-generators/torcx-generator[1687]: time="2025-05-17T00:56:02Z" level=info msg="torcx already run" May 17 00:56:02.125541 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:56:02.125552 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:56:02.137207 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:56:02.185313 kernel: audit: type=1400 audit(1747443362.178:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.191998 kernel: audit: type=1400 audit(1747443362.178:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.192046 kernel: audit: type=1400 audit(1747443362.178:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.192070 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:56:02.192094 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:56:02.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.195349 kernel: audit: type=1400 audit(1747443362.178:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.195418 kernel: audit: backlog limit exceeded May 17 00:56:02.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198676 kernel: audit: type=1400 audit(1747443362.178:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit: BPF prog-id=46 op=LOAD May 17 00:56:02.181000 audit: BPF prog-id=30 op=UNLOAD May 17 00:56:02.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit: BPF prog-id=47 op=LOAD May 17 00:56:02.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit: BPF prog-id=48 op=LOAD May 17 00:56:02.184000 audit: BPF prog-id=31 op=UNLOAD May 17 00:56:02.184000 audit: BPF prog-id=32 op=UNLOAD May 17 00:56:02.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.184000 audit: BPF prog-id=49 op=LOAD May 17 00:56:02.184000 audit: BPF prog-id=40 op=UNLOAD May 17 00:56:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.185000 audit: BPF prog-id=50 op=LOAD May 17 00:56:02.185000 audit: BPF prog-id=44 op=UNLOAD May 17 00:56:02.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.189000 audit: BPF prog-id=51 op=LOAD May 17 00:56:02.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.197000 audit: BPF prog-id=52 op=LOAD May 17 00:56:02.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.198000 audit: BPF prog-id=53 op=LOAD May 17 00:56:02.198000 audit: BPF prog-id=39 op=UNLOAD May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit: BPF prog-id=57 op=LOAD May 17 00:56:02.199000 audit: BPF prog-id=38 op=UNLOAD May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit: BPF prog-id=58 op=LOAD May 17 00:56:02.199000 audit: BPF prog-id=41 op=UNLOAD May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.199000 audit: BPF prog-id=59 op=LOAD May 17 00:56:02.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:02.200000 audit: BPF prog-id=60 op=LOAD May 17 00:56:02.200000 audit: BPF prog-id=42 op=UNLOAD May 17 00:56:02.200000 audit: BPF prog-id=43 op=UNLOAD May 17 00:56:02.450827 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:56:02.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:56:02.450889 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:56:02.451167 systemd[1]: Stopped kubelet.service. May 17 00:56:02.452811 systemd[1]: Starting kubelet.service... May 17 00:56:04.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:04.479861 systemd[1]: Started kubelet.service. May 17 00:56:04.507515 kubelet[1752]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:56:04.507742 kubelet[1752]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:56:04.507783 kubelet[1752]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:56:04.507876 kubelet[1752]: I0517 00:56:04.507855 1752 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:56:04.865633 kubelet[1752]: I0517 00:56:04.865333 1752 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:56:04.865633 kubelet[1752]: I0517 00:56:04.865355 1752 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:56:04.865633 kubelet[1752]: I0517 00:56:04.865532 1752 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:56:04.961393 kubelet[1752]: E0517 00:56:04.961370 1752 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.101:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:04.969016 kubelet[1752]: I0517 00:56:04.968995 1752 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:56:04.993294 kubelet[1752]: E0517 00:56:04.993270 1752 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:56:04.993403 kubelet[1752]: I0517 00:56:04.993395 1752 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:56:04.998393 kubelet[1752]: I0517 00:56:04.998381 1752 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:56:05.000527 kubelet[1752]: I0517 00:56:05.000517 1752 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:56:05.000736 kubelet[1752]: I0517 00:56:05.000712 1752 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:56:05.000928 kubelet[1752]: I0517 00:56:05.000783 1752 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:56:05.001049 kubelet[1752]: I0517 00:56:05.001040 1752 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:56:05.001102 kubelet[1752]: I0517 00:56:05.001093 1752 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:56:05.001211 kubelet[1752]: I0517 00:56:05.001204 1752 state_mem.go:36] "Initialized new in-memory state store" May 17 00:56:05.013795 kubelet[1752]: I0517 00:56:05.013778 1752 kubelet.go:408] "Attempting to sync node with API server" May 17 00:56:05.013920 kubelet[1752]: I0517 00:56:05.013911 1752 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:56:05.013991 kubelet[1752]: I0517 00:56:05.013983 1752 kubelet.go:314] "Adding apiserver pod source" May 17 00:56:05.014049 kubelet[1752]: I0517 00:56:05.014040 1752 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:56:05.031809 kubelet[1752]: W0517 00:56:05.031764 1752 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused May 17 00:56:05.031962 kubelet[1752]: E0517 00:56:05.031813 1752 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:05.031962 kubelet[1752]: I0517 00:56:05.031870 1752 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:56:05.032152 kubelet[1752]: I0517 00:56:05.032140 1752 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:56:05.043390 kubelet[1752]: W0517 00:56:05.043366 1752 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:56:05.189344 kubelet[1752]: W0517 00:56:05.189307 1752 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.101:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused May 17 00:56:05.189442 kubelet[1752]: E0517 00:56:05.189346 1752 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.101:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:05.232484 kubelet[1752]: I0517 00:56:05.232463 1752 server.go:1274] "Started kubelet" May 17 00:56:05.232000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:05.232000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:56:05.232000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000840630 a1=c000934af8 a2=c000840600 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.232000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:56:05.233500 kubelet[1752]: I0517 00:56:05.233488 1752 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:56:05.232000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:05.232000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:56:05.232000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00093cb00 a1=c000934b10 a2=c0008406c0 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.232000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:56:05.233712 kubelet[1752]: I0517 00:56:05.233702 1752 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:56:05.233788 kubelet[1752]: I0517 00:56:05.233781 1752 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:56:05.235000 audit[1763]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:05.235000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc94a59610 a2=0 a3=7ffc94a595fc items=0 ppid=1752 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:56:05.236000 audit[1764]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:05.236000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff13990e00 a2=0 a3=7fff13990dec items=0 ppid=1752 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:56:05.238088 kubelet[1752]: I0517 00:56:05.238058 1752 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:56:05.239051 kubelet[1752]: I0517 00:56:05.239033 1752 server.go:449] "Adding debug handlers to kubelet server" May 17 00:56:05.296418 kubelet[1752]: I0517 00:56:05.296380 1752 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:56:05.296648 kubelet[1752]: I0517 00:56:05.296640 1752 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:56:05.296852 kubelet[1752]: I0517 00:56:05.296843 1752 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:56:05.298491 kubelet[1752]: I0517 00:56:05.298483 1752 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:56:05.298660 kubelet[1752]: E0517 00:56:05.298649 1752 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:56:05.298000 audit[1766]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:05.298000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffead354f00 a2=0 a3=7ffead354eec items=0 ppid=1752 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:56:05.300898 kubelet[1752]: I0517 00:56:05.300868 1752 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:56:05.300959 kubelet[1752]: I0517 00:56:05.300944 1752 reconciler.go:26] "Reconciler: start to sync state" May 17 00:56:05.300000 audit[1768]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:05.300000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd66cacf60 a2=0 a3=7ffd66cacf4c items=0 ppid=1752 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:56:05.324037 kubelet[1752]: E0517 00:56:05.324015 1752 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.101:6443: connect: connection refused" interval="200ms" May 17 00:56:05.324254 kubelet[1752]: I0517 00:56:05.324243 1752 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:56:05.324939 kubelet[1752]: W0517 00:56:05.324919 1752 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused May 17 00:56:05.325020 kubelet[1752]: E0517 00:56:05.325010 1752 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:05.325285 kubelet[1752]: I0517 00:56:05.325277 1752 factory.go:221] Registration of the containerd container factory successfully May 17 00:56:05.325331 kubelet[1752]: I0517 00:56:05.325325 1752 factory.go:221] Registration of the systemd container factory successfully May 17 00:56:05.342511 kubelet[1752]: E0517 00:56:05.333544 1752 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.101:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.101:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18402a7b79cae41c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-17 00:56:05.232436252 +0000 UTC m=+0.750353441,LastTimestamp:2025-05-17 00:56:05.232436252 +0000 UTC m=+0.750353441,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 17 00:56:05.351000 audit[1776]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:05.351000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffd97062a0 a2=0 a3=7fffd970628c items=0 ppid=1752 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:56:05.352127 kubelet[1752]: I0517 00:56:05.352115 1752 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:56:05.352127 kubelet[1752]: I0517 00:56:05.352124 1752 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:56:05.352183 kubelet[1752]: I0517 00:56:05.352133 1752 state_mem.go:36] "Initialized new in-memory state store" May 17 00:56:05.352327 kubelet[1752]: I0517 00:56:05.352315 1752 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:56:05.352000 audit[1777]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:05.352000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0a4b5500 a2=0 a3=7ffd0a4b54ec items=0 ppid=1752 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:56:05.353135 kubelet[1752]: I0517 00:56:05.353128 1752 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:56:05.353191 kubelet[1752]: I0517 00:56:05.353180 1752 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:56:05.353246 kubelet[1752]: I0517 00:56:05.353240 1752 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:56:05.353319 kubelet[1752]: E0517 00:56:05.353309 1752 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:56:05.352000 audit[1778]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:05.352000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff398419e0 a2=0 a3=7fff398419cc items=0 ppid=1752 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:56:05.353000 audit[1779]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:05.353000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6c2de900 a2=0 a3=7ffd6c2de8ec items=0 ppid=1752 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:56:05.353000 audit[1780]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:05.353000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc17524660 a2=0 a3=7ffc1752464c items=0 ppid=1752 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:56:05.353000 audit[1781]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:05.353000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd112cc8e0 a2=0 a3=7ffd112cc8cc items=0 ppid=1752 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:56:05.354000 audit[1782]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:05.354000 audit[1783]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:05.354000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff04a45540 a2=0 a3=7fff04a4552c items=0 ppid=1752 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:56:05.354000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc992616c0 a2=0 a3=7ffc992616ac items=0 ppid=1752 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:56:05.373544 kubelet[1752]: W0517 00:56:05.373505 1752 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused May 17 00:56:05.373623 kubelet[1752]: E0517 00:56:05.373550 1752 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:05.375941 kubelet[1752]: I0517 00:56:05.375928 1752 policy_none.go:49] "None policy: Start" May 17 00:56:05.376407 kubelet[1752]: I0517 00:56:05.376399 1752 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:56:05.376465 kubelet[1752]: I0517 00:56:05.376458 1752 state_mem.go:35] "Initializing new in-memory state store" May 17 00:56:05.396144 systemd[1]: Created slice kubepods.slice. May 17 00:56:05.399361 kubelet[1752]: E0517 00:56:05.399350 1752 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:56:05.399570 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:56:05.402204 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:56:05.410495 kubelet[1752]: I0517 00:56:05.410480 1752 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:56:05.409000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:05.409000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:56:05.409000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009b8b10 a1=c00072afc0 a2=c0009b8ae0 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:05.409000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:56:05.425498 kubelet[1752]: I0517 00:56:05.425473 1752 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:56:05.425701 kubelet[1752]: I0517 00:56:05.425692 1752 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:56:05.425835 kubelet[1752]: I0517 00:56:05.425804 1752 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:56:05.426139 kubelet[1752]: I0517 00:56:05.426124 1752 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:56:05.427477 kubelet[1752]: E0517 00:56:05.427465 1752 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 17 00:56:05.460095 systemd[1]: Created slice kubepods-burstable-pod487df64b2bea09021de3d23f34d9535e.slice. May 17 00:56:05.467780 systemd[1]: Created slice kubepods-burstable-poda3416600bab1918b24583836301c9096.slice. May 17 00:56:05.477741 systemd[1]: Created slice kubepods-burstable-podea5884ad3481d5218ff4c8f11f2934d5.slice. May 17 00:56:05.502355 kubelet[1752]: I0517 00:56:05.502301 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/487df64b2bea09021de3d23f34d9535e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"487df64b2bea09021de3d23f34d9535e\") " pod="kube-system/kube-apiserver-localhost" May 17 00:56:05.502355 kubelet[1752]: I0517 00:56:05.502359 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/487df64b2bea09021de3d23f34d9535e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"487df64b2bea09021de3d23f34d9535e\") " pod="kube-system/kube-apiserver-localhost" May 17 00:56:05.502472 kubelet[1752]: I0517 00:56:05.502371 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/487df64b2bea09021de3d23f34d9535e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"487df64b2bea09021de3d23f34d9535e\") " pod="kube-system/kube-apiserver-localhost" May 17 00:56:05.502472 kubelet[1752]: I0517 00:56:05.502409 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ea5884ad3481d5218ff4c8f11f2934d5-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"ea5884ad3481d5218ff4c8f11f2934d5\") " pod="kube-system/kube-scheduler-localhost" May 17 00:56:05.502472 kubelet[1752]: I0517 00:56:05.502426 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:05.502472 kubelet[1752]: I0517 00:56:05.502435 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:05.502472 kubelet[1752]: I0517 00:56:05.502442 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:05.502574 kubelet[1752]: I0517 00:56:05.502450 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:05.502574 kubelet[1752]: I0517 00:56:05.502488 1752 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:05.524734 kubelet[1752]: E0517 00:56:05.524693 1752 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.101:6443: connect: connection refused" interval="400ms" May 17 00:56:05.527581 kubelet[1752]: I0517 00:56:05.527570 1752 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:56:05.527858 kubelet[1752]: E0517 00:56:05.527844 1752 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.101:6443/api/v1/nodes\": dial tcp 139.178.70.101:6443: connect: connection refused" node="localhost" May 17 00:56:05.729242 kubelet[1752]: I0517 00:56:05.728732 1752 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:56:05.729544 kubelet[1752]: E0517 00:56:05.729532 1752 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.101:6443/api/v1/nodes\": dial tcp 139.178.70.101:6443: connect: connection refused" node="localhost" May 17 00:56:05.767538 env[1272]: time="2025-05-17T00:56:05.767254811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:487df64b2bea09021de3d23f34d9535e,Namespace:kube-system,Attempt:0,}" May 17 00:56:05.770332 env[1272]: time="2025-05-17T00:56:05.770304220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:a3416600bab1918b24583836301c9096,Namespace:kube-system,Attempt:0,}" May 17 00:56:05.780435 env[1272]: time="2025-05-17T00:56:05.780149333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:ea5884ad3481d5218ff4c8f11f2934d5,Namespace:kube-system,Attempt:0,}" May 17 00:56:05.925754 kubelet[1752]: E0517 00:56:05.925720 1752 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.101:6443: connect: connection refused" interval="800ms" May 17 00:56:06.099320 kubelet[1752]: W0517 00:56:06.099012 1752 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.101:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused May 17 00:56:06.099320 kubelet[1752]: E0517 00:56:06.099060 1752 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.101:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:06.131275 kubelet[1752]: I0517 00:56:06.131250 1752 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:56:06.131506 kubelet[1752]: E0517 00:56:06.131492 1752 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.101:6443/api/v1/nodes\": dial tcp 139.178.70.101:6443: connect: connection refused" node="localhost" May 17 00:56:06.345180 kubelet[1752]: W0517 00:56:06.345122 1752 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused May 17 00:56:06.345180 kubelet[1752]: E0517 00:56:06.345170 1752 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:06.440541 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount470556549.mount: Deactivated successfully. May 17 00:56:06.445013 env[1272]: time="2025-05-17T00:56:06.444909046Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.445690 env[1272]: time="2025-05-17T00:56:06.445654455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.446913 env[1272]: time="2025-05-17T00:56:06.446878211Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.447629 env[1272]: time="2025-05-17T00:56:06.447607530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.449945 env[1272]: time="2025-05-17T00:56:06.449913061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.451707 env[1272]: time="2025-05-17T00:56:06.451678442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.452511 env[1272]: time="2025-05-17T00:56:06.452489648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.453117 env[1272]: time="2025-05-17T00:56:06.453096193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.455416 env[1272]: time="2025-05-17T00:56:06.455393306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.459596 env[1272]: time="2025-05-17T00:56:06.459560304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.460249 env[1272]: time="2025-05-17T00:56:06.460212647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.460758 env[1272]: time="2025-05-17T00:56:06.460742659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:06.480385 env[1272]: time="2025-05-17T00:56:06.480028117Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:06.480385 env[1272]: time="2025-05-17T00:56:06.480074630Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:06.480385 env[1272]: time="2025-05-17T00:56:06.480082651Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:06.480385 env[1272]: time="2025-05-17T00:56:06.480287107Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d8084947609c2f69e4717aa68c5d0ca6219827a497de5cc717327ac88fce93b pid=1795 runtime=io.containerd.runc.v2 May 17 00:56:06.483295 env[1272]: time="2025-05-17T00:56:06.483248738Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:06.483295 env[1272]: time="2025-05-17T00:56:06.483276145Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:06.483295 env[1272]: time="2025-05-17T00:56:06.483283252Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:06.483937 env[1272]: time="2025-05-17T00:56:06.483453899Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/820a0ee02f52cca299355558aa3c904939aba471efcefa950def4dd7c96649b9 pid=1802 runtime=io.containerd.runc.v2 May 17 00:56:06.495184 systemd[1]: Started cri-containerd-6d8084947609c2f69e4717aa68c5d0ca6219827a497de5cc717327ac88fce93b.scope. May 17 00:56:06.507099 systemd[1]: Started cri-containerd-820a0ee02f52cca299355558aa3c904939aba471efcefa950def4dd7c96649b9.scope. May 17 00:56:06.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit: BPF prog-id=61 op=LOAD May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1795 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383038343934373630396332663639653437313761613638633564 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1795 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383038343934373630396332663639653437313761613638633564 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit: BPF prog-id=62 op=LOAD May 17 00:56:06.516000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00020eff0 items=0 ppid=1795 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383038343934373630396332663639653437313761613638633564 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit: BPF prog-id=63 op=LOAD May 17 00:56:06.516000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00020f038 items=0 ppid=1795 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383038343934373630396332663639653437313761613638633564 May 17 00:56:06.516000 audit: BPF prog-id=63 op=UNLOAD May 17 00:56:06.516000 audit: BPF prog-id=62 op=UNLOAD May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.516000 audit: BPF prog-id=64 op=LOAD May 17 00:56:06.516000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00020f448 items=0 ppid=1795 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383038343934373630396332663639653437313761613638633564 May 17 00:56:06.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.520000 audit: BPF prog-id=65 op=LOAD May 17 00:56:06.520000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.520000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1802 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306130656530326635326363613239393335353535386161336339 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1802 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306130656530326635326363613239393335353535386161336339 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit: BPF prog-id=66 op=LOAD May 17 00:56:06.521000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c0530 items=0 ppid=1802 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306130656530326635326363613239393335353535386161336339 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit: BPF prog-id=67 op=LOAD May 17 00:56:06.521000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c0578 items=0 ppid=1802 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306130656530326635326363613239393335353535386161336339 May 17 00:56:06.521000 audit: BPF prog-id=67 op=UNLOAD May 17 00:56:06.521000 audit: BPF prog-id=66 op=UNLOAD May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.521000 audit: BPF prog-id=68 op=LOAD May 17 00:56:06.521000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c0988 items=0 ppid=1802 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832306130656530326635326363613239393335353535386161336339 May 17 00:56:06.524501 env[1272]: time="2025-05-17T00:56:06.524337983Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:06.524501 env[1272]: time="2025-05-17T00:56:06.524374381Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:06.524501 env[1272]: time="2025-05-17T00:56:06.524385326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:06.524589 env[1272]: time="2025-05-17T00:56:06.524531301Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36b160f3199ff1bff3b6a6316309a5f6886b3e1293116b25e37102863088604e pid=1840 runtime=io.containerd.runc.v2 May 17 00:56:06.541371 systemd[1]: Started cri-containerd-36b160f3199ff1bff3b6a6316309a5f6886b3e1293116b25e37102863088604e.scope. May 17 00:56:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit: BPF prog-id=69 op=LOAD May 17 00:56:06.555000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.555000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1840 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623136306633313939666631626666336236613633313633303961 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1840 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623136306633313939666631626666336236613633313633303961 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit: BPF prog-id=70 op=LOAD May 17 00:56:06.556000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f4010 items=0 ppid=1840 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623136306633313939666631626666336236613633313633303961 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.556000 audit: BPF prog-id=71 op=LOAD May 17 00:56:06.556000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f4058 items=0 ppid=1840 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623136306633313939666631626666336236613633313633303961 May 17 00:56:06.557000 audit: BPF prog-id=71 op=UNLOAD May 17 00:56:06.557000 audit: BPF prog-id=70 op=UNLOAD May 17 00:56:06.557000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.557000 audit: BPF prog-id=72 op=LOAD May 17 00:56:06.557000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f4468 items=0 ppid=1840 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623136306633313939666631626666336236613633313633303961 May 17 00:56:06.570181 env[1272]: time="2025-05-17T00:56:06.570152249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:a3416600bab1918b24583836301c9096,Namespace:kube-system,Attempt:0,} returns sandbox id \"6d8084947609c2f69e4717aa68c5d0ca6219827a497de5cc717327ac88fce93b\"" May 17 00:56:06.574879 env[1272]: time="2025-05-17T00:56:06.574853709Z" level=info msg="CreateContainer within sandbox \"6d8084947609c2f69e4717aa68c5d0ca6219827a497de5cc717327ac88fce93b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:56:06.577038 env[1272]: time="2025-05-17T00:56:06.577015307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:487df64b2bea09021de3d23f34d9535e,Namespace:kube-system,Attempt:0,} returns sandbox id \"820a0ee02f52cca299355558aa3c904939aba471efcefa950def4dd7c96649b9\"" May 17 00:56:06.582800 env[1272]: time="2025-05-17T00:56:06.582775316Z" level=info msg="CreateContainer within sandbox \"820a0ee02f52cca299355558aa3c904939aba471efcefa950def4dd7c96649b9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:56:06.583177 env[1272]: time="2025-05-17T00:56:06.583103133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:ea5884ad3481d5218ff4c8f11f2934d5,Namespace:kube-system,Attempt:0,} returns sandbox id \"36b160f3199ff1bff3b6a6316309a5f6886b3e1293116b25e37102863088604e\"" May 17 00:56:06.585351 env[1272]: time="2025-05-17T00:56:06.585328887Z" level=info msg="CreateContainer within sandbox \"6d8084947609c2f69e4717aa68c5d0ca6219827a497de5cc717327ac88fce93b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193\"" May 17 00:56:06.585613 env[1272]: time="2025-05-17T00:56:06.585599230Z" level=info msg="CreateContainer within sandbox \"36b160f3199ff1bff3b6a6316309a5f6886b3e1293116b25e37102863088604e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:56:06.585921 env[1272]: time="2025-05-17T00:56:06.585903143Z" level=info msg="StartContainer for \"bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193\"" May 17 00:56:06.595834 env[1272]: time="2025-05-17T00:56:06.595790587Z" level=info msg="CreateContainer within sandbox \"36b160f3199ff1bff3b6a6316309a5f6886b3e1293116b25e37102863088604e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d\"" May 17 00:56:06.596314 env[1272]: time="2025-05-17T00:56:06.596294491Z" level=info msg="StartContainer for \"bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d\"" May 17 00:56:06.598337 env[1272]: time="2025-05-17T00:56:06.598291936Z" level=info msg="CreateContainer within sandbox \"820a0ee02f52cca299355558aa3c904939aba471efcefa950def4dd7c96649b9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"07a2ccf4e1fd5da237e45bdfac4e2575d7c40c3c1f09cc7d2936e6f5885a764a\"" May 17 00:56:06.598713 env[1272]: time="2025-05-17T00:56:06.598700566Z" level=info msg="StartContainer for \"07a2ccf4e1fd5da237e45bdfac4e2575d7c40c3c1f09cc7d2936e6f5885a764a\"" May 17 00:56:06.601452 systemd[1]: Started cri-containerd-bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193.scope. May 17 00:56:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.611000 audit: BPF prog-id=73 op=LOAD May 17 00:56:06.612000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=1795 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303437653933616130303364313462613964323662383731623238 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=1795 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303437653933616130303364313462613964323662383731623238 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.612000 audit: BPF prog-id=74 op=LOAD May 17 00:56:06.612000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00026fdc0 items=0 ppid=1795 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303437653933616130303364313462613964323662383731623238 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit: BPF prog-id=75 op=LOAD May 17 00:56:06.613000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00026fe08 items=0 ppid=1795 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303437653933616130303364313462613964323662383731623238 May 17 00:56:06.613000 audit: BPF prog-id=75 op=UNLOAD May 17 00:56:06.613000 audit: BPF prog-id=74 op=UNLOAD May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.613000 audit: BPF prog-id=76 op=LOAD May 17 00:56:06.613000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0003ce218 items=0 ppid=1795 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303437653933616130303364313462613964323662383731623238 May 17 00:56:06.623116 systemd[1]: Started cri-containerd-07a2ccf4e1fd5da237e45bdfac4e2575d7c40c3c1f09cc7d2936e6f5885a764a.scope. May 17 00:56:06.633419 systemd[1]: Started cri-containerd-bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d.scope. May 17 00:56:06.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.647000 audit: BPF prog-id=77 op=LOAD May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037613263636634653166643564613233376534356264666163346532 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037613263636634653166643564613233376534356264666163346532 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit: BPF prog-id=78 op=LOAD May 17 00:56:06.648000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002cfee0 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037613263636634653166643564613233376534356264666163346532 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit: BPF prog-id=79 op=LOAD May 17 00:56:06.648000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002cff28 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037613263636634653166643564613233376534356264666163346532 May 17 00:56:06.648000 audit: BPF prog-id=79 op=UNLOAD May 17 00:56:06.648000 audit: BPF prog-id=78 op=UNLOAD May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.648000 audit: BPF prog-id=80 op=LOAD May 17 00:56:06.648000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6338 items=0 ppid=1802 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037613263636634653166643564613233376534356264666163346532 May 17 00:56:06.650774 env[1272]: time="2025-05-17T00:56:06.650749037Z" level=info msg="StartContainer for \"bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193\" returns successfully" May 17 00:56:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.656000 audit: BPF prog-id=81 op=LOAD May 17 00:56:06.657000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1840 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333032626233353632643630663531333134663935623533383063 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1840 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333032626233353632643630663531333134663935623533383063 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.657000 audit: BPF prog-id=82 op=LOAD May 17 00:56:06.657000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038ad70 items=0 ppid=1840 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333032626233353632643630663531333134663935623533383063 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.658000 audit: BPF prog-id=83 op=LOAD May 17 00:56:06.658000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038adb8 items=0 ppid=1840 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333032626233353632643630663531333134663935623533383063 May 17 00:56:06.658000 audit: BPF prog-id=83 op=UNLOAD May 17 00:56:06.659000 audit: BPF prog-id=82 op=UNLOAD May 17 00:56:06.659000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:06.659000 audit: BPF prog-id=84 op=LOAD May 17 00:56:06.659000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038b1c8 items=0 ppid=1840 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:06.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333032626233353632643630663531333134663935623533383063 May 17 00:56:06.676017 env[1272]: time="2025-05-17T00:56:06.675993633Z" level=info msg="StartContainer for \"07a2ccf4e1fd5da237e45bdfac4e2575d7c40c3c1f09cc7d2936e6f5885a764a\" returns successfully" May 17 00:56:06.700605 env[1272]: time="2025-05-17T00:56:06.693784077Z" level=info msg="StartContainer for \"bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d\" returns successfully" May 17 00:56:06.726659 kubelet[1752]: E0517 00:56:06.726625 1752 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.101:6443: connect: connection refused" interval="1.6s" May 17 00:56:06.908582 kubelet[1752]: W0517 00:56:06.908556 1752 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused May 17 00:56:06.908711 kubelet[1752]: E0517 00:56:06.908585 1752 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:06.914084 kubelet[1752]: W0517 00:56:06.914058 1752 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused May 17 00:56:06.914121 kubelet[1752]: E0517 00:56:06.914086 1752 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:06.932976 kubelet[1752]: I0517 00:56:06.932956 1752 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:56:06.933154 kubelet[1752]: E0517 00:56:06.933138 1752 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.101:6443/api/v1/nodes\": dial tcp 139.178.70.101:6443: connect: connection refused" node="localhost" May 17 00:56:06.975949 kubelet[1752]: E0517 00:56:06.975871 1752 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.101:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.101:6443: connect: connection refused" logger="UnhandledError" May 17 00:56:08.124000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.126538 kernel: kauditd_printk_skb: 640 callbacks suppressed May 17 00:56:08.126583 kernel: audit: type=1400 audit(1747443368.124:524): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.124000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00039ba70 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:08.133602 kernel: audit: type=1300 audit(1747443368.124:524): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00039ba70 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:08.133652 kernel: audit: type=1327 audit(1747443368.124:524): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:08.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:08.124000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.139923 kernel: audit: type=1400 audit(1747443368.124:525): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.139982 kernel: audit: type=1300 audit(1747443368.124:525): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000153f00 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:08.124000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000153f00 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:08.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:08.147343 kernel: audit: type=1327 audit(1747443368.124:525): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:08.527000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.527000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.534443 kernel: audit: type=1400 audit(1747443368.527:526): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.534501 kernel: audit: type=1400 audit(1747443368.527:527): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.527000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0048d5530 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:56:08.538897 kernel: audit: type=1300 audit(1747443368.527:527): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0048d5530 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:56:08.539085 kubelet[1752]: I0517 00:56:08.539065 1752 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:56:08.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:56:08.542893 kernel: audit: type=1327 audit(1747443368.527:527): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:56:08.527000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.527000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00481a880 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:56:08.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:56:08.527000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0039711d0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:56:08.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:56:08.530000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.530000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003971230 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:56:08.530000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:56:08.568000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.568000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c003b5a9a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:56:08.568000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:56:08.568000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:08.568000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0033087b0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:56:08.568000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:56:08.613873 kubelet[1752]: E0517 00:56:08.613839 1752 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 17 00:56:08.676331 kubelet[1752]: I0517 00:56:08.676308 1752 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 17 00:56:08.676460 kubelet[1752]: E0517 00:56:08.676450 1752 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 17 00:56:08.686653 kubelet[1752]: E0517 00:56:08.686628 1752 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:56:09.168157 kubelet[1752]: E0517 00:56:09.168134 1752 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 17 00:56:09.191308 kubelet[1752]: I0517 00:56:09.191281 1752 apiserver.go:52] "Watching apiserver" May 17 00:56:09.201965 kubelet[1752]: I0517 00:56:09.201945 1752 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:56:10.781223 systemd[1]: Reloading. May 17 00:56:10.858665 /usr/lib/systemd/system-generators/torcx-generator[2038]: time="2025-05-17T00:56:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:56:10.858694 /usr/lib/systemd/system-generators/torcx-generator[2038]: time="2025-05-17T00:56:10Z" level=info msg="torcx already run" May 17 00:56:10.920036 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:56:10.920050 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:56:10.932926 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:56:10.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit: BPF prog-id=85 op=LOAD May 17 00:56:10.980000 audit: BPF prog-id=46 op=UNLOAD May 17 00:56:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit: BPF prog-id=86 op=LOAD May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit: BPF prog-id=87 op=LOAD May 17 00:56:10.981000 audit: BPF prog-id=47 op=UNLOAD May 17 00:56:10.981000 audit: BPF prog-id=48 op=UNLOAD May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit: BPF prog-id=88 op=LOAD May 17 00:56:10.982000 audit: BPF prog-id=49 op=UNLOAD May 17 00:56:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit: BPF prog-id=89 op=LOAD May 17 00:56:10.983000 audit: BPF prog-id=61 op=UNLOAD May 17 00:56:10.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit: BPF prog-id=90 op=LOAD May 17 00:56:10.984000 audit: BPF prog-id=77 op=UNLOAD May 17 00:56:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit: BPF prog-id=91 op=LOAD May 17 00:56:10.985000 audit: BPF prog-id=65 op=UNLOAD May 17 00:56:10.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit: BPF prog-id=92 op=LOAD May 17 00:56:10.986000 audit: BPF prog-id=50 op=UNLOAD May 17 00:56:10.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.986000 audit: BPF prog-id=93 op=LOAD May 17 00:56:10.986000 audit: BPF prog-id=81 op=UNLOAD May 17 00:56:10.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit: BPF prog-id=94 op=LOAD May 17 00:56:10.988000 audit: BPF prog-id=69 op=UNLOAD May 17 00:56:10.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.988000 audit: BPF prog-id=95 op=LOAD May 17 00:56:10.988000 audit: BPF prog-id=73 op=UNLOAD May 17 00:56:10.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit: BPF prog-id=96 op=LOAD May 17 00:56:10.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.989000 audit: BPF prog-id=97 op=LOAD May 17 00:56:10.990000 audit: BPF prog-id=51 op=UNLOAD May 17 00:56:10.990000 audit: BPF prog-id=52 op=UNLOAD May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit: BPF prog-id=98 op=LOAD May 17 00:56:10.990000 audit: BPF prog-id=53 op=UNLOAD May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.990000 audit: BPF prog-id=99 op=LOAD May 17 00:56:10.990000 audit: BPF prog-id=54 op=UNLOAD May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit: BPF prog-id=100 op=LOAD May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit: BPF prog-id=101 op=LOAD May 17 00:56:10.991000 audit: BPF prog-id=55 op=UNLOAD May 17 00:56:10.991000 audit: BPF prog-id=56 op=UNLOAD May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.991000 audit: BPF prog-id=102 op=LOAD May 17 00:56:10.991000 audit: BPF prog-id=57 op=UNLOAD May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit: BPF prog-id=103 op=LOAD May 17 00:56:10.992000 audit: BPF prog-id=58 op=UNLOAD May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit: BPF prog-id=104 op=LOAD May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:10.992000 audit: BPF prog-id=105 op=LOAD May 17 00:56:10.992000 audit: BPF prog-id=59 op=UNLOAD May 17 00:56:10.992000 audit: BPF prog-id=60 op=UNLOAD May 17 00:56:11.007437 systemd[1]: Stopping kubelet.service... May 17 00:56:11.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:11.032132 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:56:11.032442 systemd[1]: Stopped kubelet.service. May 17 00:56:11.035656 systemd[1]: Starting kubelet.service... May 17 00:56:12.132000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:12.132000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000827200 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:12.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:12.132000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:12.132000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000827440 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:12.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:12.132000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:12.132000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000827760 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:12.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:12.134000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:56:12.134000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0011137c0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:12.134000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:12.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:12.579797 systemd[1]: Started kubelet.service. May 17 00:56:12.655665 kubelet[2102]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:56:12.656698 kubelet[2102]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:56:12.656746 kubelet[2102]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:56:12.656859 kubelet[2102]: I0517 00:56:12.656836 2102 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:56:12.671069 kubelet[2102]: I0517 00:56:12.671045 2102 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:56:12.671069 kubelet[2102]: I0517 00:56:12.671063 2102 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:56:12.671769 kubelet[2102]: I0517 00:56:12.671218 2102 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:56:12.671997 kubelet[2102]: I0517 00:56:12.671984 2102 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:56:12.682167 kubelet[2102]: I0517 00:56:12.681538 2102 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:56:12.688794 kubelet[2102]: E0517 00:56:12.688773 2102 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:56:12.688917 kubelet[2102]: I0517 00:56:12.688897 2102 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:56:12.690731 kubelet[2102]: I0517 00:56:12.690718 2102 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:56:12.690798 kubelet[2102]: I0517 00:56:12.690786 2102 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:56:12.690891 kubelet[2102]: I0517 00:56:12.690863 2102 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:56:12.690992 kubelet[2102]: I0517 00:56:12.690890 2102 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:56:12.710359 kubelet[2102]: I0517 00:56:12.710331 2102 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:56:12.710359 kubelet[2102]: I0517 00:56:12.710363 2102 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:56:12.710491 kubelet[2102]: I0517 00:56:12.710406 2102 state_mem.go:36] "Initialized new in-memory state store" May 17 00:56:12.716377 kubelet[2102]: I0517 00:56:12.716351 2102 kubelet.go:408] "Attempting to sync node with API server" May 17 00:56:12.716456 kubelet[2102]: I0517 00:56:12.716381 2102 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:56:12.716456 kubelet[2102]: I0517 00:56:12.716408 2102 kubelet.go:314] "Adding apiserver pod source" May 17 00:56:12.716456 kubelet[2102]: I0517 00:56:12.716417 2102 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:56:12.719071 kubelet[2102]: I0517 00:56:12.718746 2102 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:56:12.719071 kubelet[2102]: I0517 00:56:12.719044 2102 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:56:12.739258 kubelet[2102]: I0517 00:56:12.739231 2102 server.go:1274] "Started kubelet" May 17 00:56:12.756476 kubelet[2102]: I0517 00:56:12.756438 2102 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:56:12.757292 kubelet[2102]: I0517 00:56:12.757282 2102 server.go:449] "Adding debug handlers to kubelet server" May 17 00:56:12.760000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:12.760000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:56:12.760000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc41e0 a1=c000b7e6c0 a2=c000bc41b0 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:12.760000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:56:12.762363 kubelet[2102]: I0517 00:56:12.762351 2102 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:56:12.760000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:12.760000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:56:12.760000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009eafe0 a1=c000b7e6d8 a2=c000bc4270 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:12.760000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:56:12.762585 kubelet[2102]: I0517 00:56:12.762570 2102 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:56:12.762642 kubelet[2102]: I0517 00:56:12.762635 2102 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:56:12.772058 kubelet[2102]: I0517 00:56:12.772040 2102 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:56:12.774403 kubelet[2102]: I0517 00:56:12.774390 2102 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:56:12.774705 kubelet[2102]: E0517 00:56:12.774691 2102 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:56:12.778744 kubelet[2102]: I0517 00:56:12.778725 2102 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:56:12.778964 kubelet[2102]: I0517 00:56:12.778955 2102 reconciler.go:26] "Reconciler: start to sync state" May 17 00:56:12.781831 kubelet[2102]: I0517 00:56:12.781802 2102 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:56:12.783022 kubelet[2102]: I0517 00:56:12.783011 2102 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:56:12.811871 kubelet[2102]: I0517 00:56:12.811855 2102 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:56:12.812014 kubelet[2102]: I0517 00:56:12.812007 2102 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:56:12.812114 kubelet[2102]: E0517 00:56:12.812103 2102 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:56:12.812989 kubelet[2102]: I0517 00:56:12.812978 2102 factory.go:221] Registration of the systemd container factory successfully May 17 00:56:12.813106 kubelet[2102]: I0517 00:56:12.813095 2102 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:56:12.830843 kubelet[2102]: I0517 00:56:12.830809 2102 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:56:12.831014 kubelet[2102]: I0517 00:56:12.830979 2102 factory.go:221] Registration of the containerd container factory successfully May 17 00:56:12.831068 kubelet[2102]: I0517 00:56:12.831057 2102 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:56:12.832809 kubelet[2102]: E0517 00:56:12.832794 2102 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:56:12.860165 kubelet[2102]: I0517 00:56:12.860150 2102 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:56:12.860272 kubelet[2102]: I0517 00:56:12.860263 2102 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:56:12.860331 kubelet[2102]: I0517 00:56:12.860324 2102 state_mem.go:36] "Initialized new in-memory state store" May 17 00:56:12.860460 kubelet[2102]: I0517 00:56:12.860452 2102 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:56:12.860520 kubelet[2102]: I0517 00:56:12.860504 2102 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:56:12.860565 kubelet[2102]: I0517 00:56:12.860558 2102 policy_none.go:49] "None policy: Start" May 17 00:56:12.861325 kubelet[2102]: I0517 00:56:12.861317 2102 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:56:12.861387 kubelet[2102]: I0517 00:56:12.861381 2102 state_mem.go:35] "Initializing new in-memory state store" May 17 00:56:12.861512 kubelet[2102]: I0517 00:56:12.861506 2102 state_mem.go:75] "Updated machine memory state" May 17 00:56:12.880194 kubelet[2102]: I0517 00:56:12.880167 2102 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:56:12.878000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:12.878000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:56:12.878000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001016720 a1=c00100afc0 a2=c0010166f0 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:12.878000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:56:12.880453 kubelet[2102]: I0517 00:56:12.880221 2102 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:56:12.880453 kubelet[2102]: I0517 00:56:12.880326 2102 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:56:12.880453 kubelet[2102]: I0517 00:56:12.880333 2102 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:56:12.880539 kubelet[2102]: I0517 00:56:12.880529 2102 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:56:12.981817 kubelet[2102]: I0517 00:56:12.981795 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/487df64b2bea09021de3d23f34d9535e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"487df64b2bea09021de3d23f34d9535e\") " pod="kube-system/kube-apiserver-localhost" May 17 00:56:12.983790 kubelet[2102]: I0517 00:56:12.983771 2102 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:56:12.987564 kubelet[2102]: I0517 00:56:12.987548 2102 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 17 00:56:12.987697 kubelet[2102]: I0517 00:56:12.987688 2102 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 17 00:56:13.082145 kubelet[2102]: I0517 00:56:13.082076 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:13.082261 kubelet[2102]: I0517 00:56:13.082249 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ea5884ad3481d5218ff4c8f11f2934d5-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"ea5884ad3481d5218ff4c8f11f2934d5\") " pod="kube-system/kube-scheduler-localhost" May 17 00:56:13.082332 kubelet[2102]: I0517 00:56:13.082323 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:13.082391 kubelet[2102]: I0517 00:56:13.082382 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:13.082451 kubelet[2102]: I0517 00:56:13.082442 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:13.082514 kubelet[2102]: I0517 00:56:13.082503 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:56:13.082565 kubelet[2102]: I0517 00:56:13.082556 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/487df64b2bea09021de3d23f34d9535e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"487df64b2bea09021de3d23f34d9535e\") " pod="kube-system/kube-apiserver-localhost" May 17 00:56:13.082648 kubelet[2102]: I0517 00:56:13.082639 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/487df64b2bea09021de3d23f34d9535e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"487df64b2bea09021de3d23f34d9535e\") " pod="kube-system/kube-apiserver-localhost" May 17 00:56:13.742574 kubelet[2102]: I0517 00:56:13.742548 2102 apiserver.go:52] "Watching apiserver" May 17 00:56:13.779505 kubelet[2102]: I0517 00:56:13.779476 2102 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:56:13.871870 kubelet[2102]: E0517 00:56:13.871851 2102 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 17 00:56:13.910440 kubelet[2102]: I0517 00:56:13.910396 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.910382173 podStartE2EDuration="1.910382173s" podCreationTimestamp="2025-05-17 00:56:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:56:13.893037677 +0000 UTC m=+1.293872135" watchObservedRunningTime="2025-05-17 00:56:13.910382173 +0000 UTC m=+1.311216632" May 17 00:56:13.934402 kubelet[2102]: I0517 00:56:13.934363 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.934350518 podStartE2EDuration="1.934350518s" podCreationTimestamp="2025-05-17 00:56:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:56:13.91073043 +0000 UTC m=+1.311564888" watchObservedRunningTime="2025-05-17 00:56:13.934350518 +0000 UTC m=+1.335184965" May 17 00:56:13.938839 kubelet[2102]: I0517 00:56:13.938805 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.938794287 podStartE2EDuration="1.938794287s" podCreationTimestamp="2025-05-17 00:56:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:56:13.934592435 +0000 UTC m=+1.335426882" watchObservedRunningTime="2025-05-17 00:56:13.938794287 +0000 UTC m=+1.339628739" May 17 00:56:15.645000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7347 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:56:15.650900 kernel: kauditd_printk_skb: 284 callbacks suppressed May 17 00:56:15.650967 kernel: audit: type=1400 audit(1747443375.645:785): avc: denied { watch } for pid=1937 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7347 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:56:15.645000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009fbd00 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:15.655268 kernel: audit: type=1300 audit(1747443375.645:785): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009fbd00 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:56:15.655305 kernel: audit: type=1327 audit(1747443375.645:785): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:15.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:56:16.653991 kubelet[2102]: I0517 00:56:16.653968 2102 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:56:16.654630 env[1272]: time="2025-05-17T00:56:16.654552471Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:56:16.654926 kubelet[2102]: I0517 00:56:16.654916 2102 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:56:17.329006 systemd[1]: Created slice kubepods-besteffort-pode699aef5_dd0f_4600_9521_2ce1f71a4c05.slice. May 17 00:56:17.411872 kubelet[2102]: I0517 00:56:17.411843 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e699aef5-dd0f-4600-9521-2ce1f71a4c05-lib-modules\") pod \"kube-proxy-ltkbp\" (UID: \"e699aef5-dd0f-4600-9521-2ce1f71a4c05\") " pod="kube-system/kube-proxy-ltkbp" May 17 00:56:17.411872 kubelet[2102]: I0517 00:56:17.411869 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e699aef5-dd0f-4600-9521-2ce1f71a4c05-xtables-lock\") pod \"kube-proxy-ltkbp\" (UID: \"e699aef5-dd0f-4600-9521-2ce1f71a4c05\") " pod="kube-system/kube-proxy-ltkbp" May 17 00:56:17.412045 kubelet[2102]: I0517 00:56:17.411896 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e699aef5-dd0f-4600-9521-2ce1f71a4c05-kube-proxy\") pod \"kube-proxy-ltkbp\" (UID: \"e699aef5-dd0f-4600-9521-2ce1f71a4c05\") " pod="kube-system/kube-proxy-ltkbp" May 17 00:56:17.412045 kubelet[2102]: I0517 00:56:17.411909 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ml6fk\" (UniqueName: \"kubernetes.io/projected/e699aef5-dd0f-4600-9521-2ce1f71a4c05-kube-api-access-ml6fk\") pod \"kube-proxy-ltkbp\" (UID: \"e699aef5-dd0f-4600-9521-2ce1f71a4c05\") " pod="kube-system/kube-proxy-ltkbp" May 17 00:56:17.518415 kubelet[2102]: E0517 00:56:17.518382 2102 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 17 00:56:17.518657 kubelet[2102]: E0517 00:56:17.518643 2102 projected.go:194] Error preparing data for projected volume kube-api-access-ml6fk for pod kube-system/kube-proxy-ltkbp: configmap "kube-root-ca.crt" not found May 17 00:56:17.518799 kubelet[2102]: E0517 00:56:17.518789 2102 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/e699aef5-dd0f-4600-9521-2ce1f71a4c05-kube-api-access-ml6fk podName:e699aef5-dd0f-4600-9521-2ce1f71a4c05 nodeName:}" failed. No retries permitted until 2025-05-17 00:56:18.018768798 +0000 UTC m=+5.419603247 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-ml6fk" (UniqueName: "kubernetes.io/projected/e699aef5-dd0f-4600-9521-2ce1f71a4c05-kube-api-access-ml6fk") pod "kube-proxy-ltkbp" (UID: "e699aef5-dd0f-4600-9521-2ce1f71a4c05") : configmap "kube-root-ca.crt" not found May 17 00:56:17.674821 systemd[1]: Created slice kubepods-besteffort-podd9a849c3_f4a3_476a_b647_a76a2ea40589.slice. May 17 00:56:17.714110 kubelet[2102]: I0517 00:56:17.714072 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dfnp6\" (UniqueName: \"kubernetes.io/projected/d9a849c3-f4a3-476a-b647-a76a2ea40589-kube-api-access-dfnp6\") pod \"tigera-operator-7c5755cdcb-pnkq7\" (UID: \"d9a849c3-f4a3-476a-b647-a76a2ea40589\") " pod="tigera-operator/tigera-operator-7c5755cdcb-pnkq7" May 17 00:56:17.714538 kubelet[2102]: I0517 00:56:17.714507 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d9a849c3-f4a3-476a-b647-a76a2ea40589-var-lib-calico\") pod \"tigera-operator-7c5755cdcb-pnkq7\" (UID: \"d9a849c3-f4a3-476a-b647-a76a2ea40589\") " pod="tigera-operator/tigera-operator-7c5755cdcb-pnkq7" May 17 00:56:17.819194 kubelet[2102]: I0517 00:56:17.819171 2102 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:56:17.977148 env[1272]: time="2025-05-17T00:56:17.976916515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-pnkq7,Uid:d9a849c3-f4a3-476a-b647-a76a2ea40589,Namespace:tigera-operator,Attempt:0,}" May 17 00:56:17.991834 env[1272]: time="2025-05-17T00:56:17.991784907Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:17.991834 env[1272]: time="2025-05-17T00:56:17.991813820Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:17.991999 env[1272]: time="2025-05-17T00:56:17.991962540Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:17.992201 env[1272]: time="2025-05-17T00:56:17.992160535Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/802727fa2f24ea7b3fea76766ca0f1aa2c107245d64d91c006f82fd65450dedb pid=2152 runtime=io.containerd.runc.v2 May 17 00:56:18.011057 systemd[1]: Started cri-containerd-802727fa2f24ea7b3fea76766ca0f1aa2c107245d64d91c006f82fd65450dedb.scope. May 17 00:56:18.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.033574 kernel: audit: type=1400 audit(1747443378.026:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.033632 kernel: audit: type=1400 audit(1747443378.026:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.036142 kernel: audit: type=1400 audit(1747443378.026:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.038783 kernel: audit: type=1400 audit(1747443378.026:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.044901 kernel: audit: type=1400 audit(1747443378.026:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.044930 kernel: audit: type=1400 audit(1747443378.026:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.044949 kernel: audit: type=1400 audit(1747443378.026:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit: BPF prog-id=106 op=LOAD May 17 00:56:18.026000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323732376661326632346561376233666561373637363663613066 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323732376661326632346561376233666561373637363663613066 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.026000 audit: BPF prog-id=107 op=LOAD May 17 00:56:18.026000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000284db0 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323732376661326632346561376233666561373637363663613066 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.029000 audit: BPF prog-id=108 op=LOAD May 17 00:56:18.029000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000284df8 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323732376661326632346561376233666561373637363663613066 May 17 00:56:18.034000 audit: BPF prog-id=108 op=UNLOAD May 17 00:56:18.034000 audit: BPF prog-id=107 op=UNLOAD May 17 00:56:18.034000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.034000 audit: BPF prog-id=109 op=LOAD May 17 00:56:18.034000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000285208 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323732376661326632346561376233666561373637363663613066 May 17 00:56:18.068862 env[1272]: time="2025-05-17T00:56:18.068830727Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-pnkq7,Uid:d9a849c3-f4a3-476a-b647-a76a2ea40589,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"802727fa2f24ea7b3fea76766ca0f1aa2c107245d64d91c006f82fd65450dedb\"" May 17 00:56:18.070760 env[1272]: time="2025-05-17T00:56:18.070743327Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:56:18.237778 env[1272]: time="2025-05-17T00:56:18.237074786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ltkbp,Uid:e699aef5-dd0f-4600-9521-2ce1f71a4c05,Namespace:kube-system,Attempt:0,}" May 17 00:56:18.247056 env[1272]: time="2025-05-17T00:56:18.247013051Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:18.247170 env[1272]: time="2025-05-17T00:56:18.247058985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:18.247170 env[1272]: time="2025-05-17T00:56:18.247075808Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:18.247299 env[1272]: time="2025-05-17T00:56:18.247270928Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5eec59f928d9a9e39f3629575d9773c23fd13fb2b5ed563b5780623c3c9d5d5c pid=2194 runtime=io.containerd.runc.v2 May 17 00:56:18.254712 systemd[1]: Started cri-containerd-5eec59f928d9a9e39f3629575d9773c23fd13fb2b5ed563b5780623c3c9d5d5c.scope. May 17 00:56:18.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit: BPF prog-id=110 op=LOAD May 17 00:56:18.264000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2194 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656335396639323864396139653339663336323935373564393737 May 17 00:56:18.264000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.264000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2194 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656335396639323864396139653339663336323935373564393737 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit: BPF prog-id=111 op=LOAD May 17 00:56:18.265000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018dc50 items=0 ppid=2194 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656335396639323864396139653339663336323935373564393737 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit: BPF prog-id=112 op=LOAD May 17 00:56:18.265000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018dc98 items=0 ppid=2194 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656335396639323864396139653339663336323935373564393737 May 17 00:56:18.265000 audit: BPF prog-id=112 op=UNLOAD May 17 00:56:18.265000 audit: BPF prog-id=111 op=UNLOAD May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { perfmon } for pid=2203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit[2203]: AVC avc: denied { bpf } for pid=2203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.265000 audit: BPF prog-id=113 op=LOAD May 17 00:56:18.265000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001ba0a8 items=0 ppid=2194 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565656335396639323864396139653339663336323935373564393737 May 17 00:56:18.275649 env[1272]: time="2025-05-17T00:56:18.275613691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ltkbp,Uid:e699aef5-dd0f-4600-9521-2ce1f71a4c05,Namespace:kube-system,Attempt:0,} returns sandbox id \"5eec59f928d9a9e39f3629575d9773c23fd13fb2b5ed563b5780623c3c9d5d5c\"" May 17 00:56:18.277572 env[1272]: time="2025-05-17T00:56:18.277551249Z" level=info msg="CreateContainer within sandbox \"5eec59f928d9a9e39f3629575d9773c23fd13fb2b5ed563b5780623c3c9d5d5c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:56:18.289235 env[1272]: time="2025-05-17T00:56:18.289204873Z" level=info msg="CreateContainer within sandbox \"5eec59f928d9a9e39f3629575d9773c23fd13fb2b5ed563b5780623c3c9d5d5c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"09e8d804a3a35df74f5aa718e3d00b72c8305b17c92958ea0273b49d5c210c71\"" May 17 00:56:18.289916 env[1272]: time="2025-05-17T00:56:18.289875322Z" level=info msg="StartContainer for \"09e8d804a3a35df74f5aa718e3d00b72c8305b17c92958ea0273b49d5c210c71\"" May 17 00:56:18.301229 systemd[1]: Started cri-containerd-09e8d804a3a35df74f5aa718e3d00b72c8305b17c92958ea0273b49d5c210c71.scope. May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f93c4181718 items=0 ppid=2194 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653864383034613361333564663734663561613731386533643030 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit: BPF prog-id=114 op=LOAD May 17 00:56:18.310000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000210a28 items=0 ppid=2194 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653864383034613361333564663734663561613731386533643030 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit: BPF prog-id=115 op=LOAD May 17 00:56:18.310000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000210a78 items=0 ppid=2194 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653864383034613361333564663734663561613731386533643030 May 17 00:56:18.310000 audit: BPF prog-id=115 op=UNLOAD May 17 00:56:18.310000 audit: BPF prog-id=114 op=UNLOAD May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:18.310000 audit: BPF prog-id=116 op=LOAD May 17 00:56:18.310000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000210b08 items=0 ppid=2194 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:18.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653864383034613361333564663734663561613731386533643030 May 17 00:56:18.336616 env[1272]: time="2025-05-17T00:56:18.336558231Z" level=info msg="StartContainer for \"09e8d804a3a35df74f5aa718e3d00b72c8305b17c92958ea0273b49d5c210c71\" returns successfully" May 17 00:56:18.859040 kubelet[2102]: I0517 00:56:18.858490 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ltkbp" podStartSLOduration=1.858476623 podStartE2EDuration="1.858476623s" podCreationTimestamp="2025-05-17 00:56:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:56:18.858377014 +0000 UTC m=+6.259211473" watchObservedRunningTime="2025-05-17 00:56:18.858476623 +0000 UTC m=+6.259311075" May 17 00:56:19.046000 audit[2295]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.046000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb62c7d00 a2=0 a3=7ffcb62c7cec items=0 ppid=2246 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:56:19.047000 audit[2296]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.047000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc498304f0 a2=0 a3=7ffc498304dc items=0 ppid=2246 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:56:19.048000 audit[2297]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.048000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3628d540 a2=0 a3=7ffc3628d52c items=0 ppid=2246 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:56:19.049000 audit[2298]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.049000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc29375e50 a2=0 a3=7ffc29375e3c items=0 ppid=2246 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:56:19.049000 audit[2299]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.049000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2e7d8150 a2=0 a3=7fff2e7d813c items=0 ppid=2246 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:56:19.050000 audit[2300]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.050000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff08f59c40 a2=0 a3=7fff08f59c2c items=0 ppid=2246 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:56:19.154000 audit[2301]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.154000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd4f063380 a2=0 a3=7ffd4f06336c items=0 ppid=2246 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:56:19.161000 audit[2303]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.161000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffce36e030 a2=0 a3=7fffce36e01c items=0 ppid=2246 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:56:19.164000 audit[2306]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.164000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc10180bd0 a2=0 a3=7ffc10180bbc items=0 ppid=2246 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:56:19.165000 audit[2307]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.165000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7479fa70 a2=0 a3=7ffd7479fa5c items=0 ppid=2246 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:56:19.167000 audit[2309]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.167000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef1e0ffa0 a2=0 a3=7ffef1e0ff8c items=0 ppid=2246 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:56:19.168000 audit[2310]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.168000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6a4c2130 a2=0 a3=7ffd6a4c211c items=0 ppid=2246 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:56:19.170000 audit[2312]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.170000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffeb35f4a0 a2=0 a3=7fffeb35f48c items=0 ppid=2246 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:56:19.172000 audit[2315]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.172000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe00a22190 a2=0 a3=7ffe00a2217c items=0 ppid=2246 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:56:19.173000 audit[2316]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.173000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff42ccf810 a2=0 a3=7fff42ccf7fc items=0 ppid=2246 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:56:19.175000 audit[2319]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.175000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe70851f20 a2=0 a3=7ffe70851f0c items=0 ppid=2246 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:56:19.175000 audit[2320]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.175000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd69c15470 a2=0 a3=7ffd69c1545c items=0 ppid=2246 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:56:19.177000 audit[2322]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.177000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc61150770 a2=0 a3=7ffc6115075c items=0 ppid=2246 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:56:19.180000 audit[2325]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.180000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc2bfa300 a2=0 a3=7ffdc2bfa2ec items=0 ppid=2246 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:56:19.182000 audit[2328]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.182000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe426bf8e0 a2=0 a3=7ffe426bf8cc items=0 ppid=2246 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:56:19.183000 audit[2329]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.183000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcead4c540 a2=0 a3=7ffcead4c52c items=0 ppid=2246 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:56:19.185000 audit[2331]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.185000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffffac84e0 a2=0 a3=7fffffac84cc items=0 ppid=2246 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:56:19.187000 audit[2334]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.187000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff26ead860 a2=0 a3=7fff26ead84c items=0 ppid=2246 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:56:19.188000 audit[2335]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.188000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0fb0e480 a2=0 a3=7ffc0fb0e46c items=0 ppid=2246 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:56:19.189000 audit[2337]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:56:19.189000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd17f32a00 a2=0 a3=7ffd17f329ec items=0 ppid=2246 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:56:19.209000 audit[2343]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:19.209000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe48649c30 a2=0 a3=7ffe48649c1c items=0 ppid=2246 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:19.217000 audit[2343]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:19.217000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe48649c30 a2=0 a3=7ffe48649c1c items=0 ppid=2246 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:19.218000 audit[2348]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.218000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffccaee3850 a2=0 a3=7ffccaee383c items=0 ppid=2246 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:56:19.220000 audit[2350]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.220000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc8d5da8f0 a2=0 a3=7ffc8d5da8dc items=0 ppid=2246 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:56:19.223000 audit[2353]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.223000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff321980c0 a2=0 a3=7fff321980ac items=0 ppid=2246 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:56:19.223000 audit[2354]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.223000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2a429470 a2=0 a3=7ffc2a42945c items=0 ppid=2246 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:56:19.225000 audit[2356]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.225000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3dc63c30 a2=0 a3=7ffd3dc63c1c items=0 ppid=2246 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:56:19.226000 audit[2357]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.226000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec827b530 a2=0 a3=7ffec827b51c items=0 ppid=2246 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:56:19.227000 audit[2359]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.227000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeeac0eaa0 a2=0 a3=7ffeeac0ea8c items=0 ppid=2246 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:56:19.230000 audit[2362]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.230000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff25fa3530 a2=0 a3=7fff25fa351c items=0 ppid=2246 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:56:19.231000 audit[2363]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.231000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8a79ec30 a2=0 a3=7fff8a79ec1c items=0 ppid=2246 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:56:19.234000 audit[2365]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.234000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2f55c170 a2=0 a3=7fff2f55c15c items=0 ppid=2246 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:56:19.234000 audit[2366]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.234000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7a2b3f90 a2=0 a3=7ffd7a2b3f7c items=0 ppid=2246 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:56:19.236000 audit[2368]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.236000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd467d580 a2=0 a3=7ffdd467d56c items=0 ppid=2246 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:56:19.238000 audit[2371]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.238000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2c39d470 a2=0 a3=7ffc2c39d45c items=0 ppid=2246 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:56:19.241000 audit[2374]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.241000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2d766700 a2=0 a3=7ffc2d7666ec items=0 ppid=2246 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:56:19.241000 audit[2375]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.241000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb2c6d910 a2=0 a3=7ffdb2c6d8fc items=0 ppid=2246 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:56:19.243000 audit[2377]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.243000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe6df39d00 a2=0 a3=7ffe6df39cec items=0 ppid=2246 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:56:19.245000 audit[2380]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.245000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd0e376270 a2=0 a3=7ffd0e37625c items=0 ppid=2246 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:56:19.245000 audit[2381]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.245000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf6e1d8c0 a2=0 a3=7ffdf6e1d8ac items=0 ppid=2246 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:56:19.247000 audit[2383]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.247000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffed6bad1b0 a2=0 a3=7ffed6bad19c items=0 ppid=2246 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:56:19.248000 audit[2384]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.248000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce4452a90 a2=0 a3=7ffce4452a7c items=0 ppid=2246 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:56:19.249000 audit[2386]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.249000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc2cd43f00 a2=0 a3=7ffc2cd43eec items=0 ppid=2246 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:56:19.251000 audit[2389]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:56:19.251000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffffb91c4d0 a2=0 a3=7ffffb91c4bc items=0 ppid=2246 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:56:19.253000 audit[2391]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:56:19.253000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe64865760 a2=0 a3=7ffe6486574c items=0 ppid=2246 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.253000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:19.253000 audit[2391]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:56:19.253000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe64865760 a2=0 a3=7ffe6486574c items=0 ppid=2246 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:19.253000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:19.505862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3046769378.mount: Deactivated successfully. May 17 00:56:20.257512 env[1272]: time="2025-05-17T00:56:20.257485222Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:20.258474 env[1272]: time="2025-05-17T00:56:20.258460670Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:20.259278 env[1272]: time="2025-05-17T00:56:20.259259859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:20.260274 env[1272]: time="2025-05-17T00:56:20.260261854Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:20.260531 env[1272]: time="2025-05-17T00:56:20.260517429Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:56:20.263552 env[1272]: time="2025-05-17T00:56:20.263529516Z" level=info msg="CreateContainer within sandbox \"802727fa2f24ea7b3fea76766ca0f1aa2c107245d64d91c006f82fd65450dedb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:56:20.269142 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount907549010.mount: Deactivated successfully. May 17 00:56:20.271540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1371413635.mount: Deactivated successfully. May 17 00:56:20.277549 env[1272]: time="2025-05-17T00:56:20.277526878Z" level=info msg="CreateContainer within sandbox \"802727fa2f24ea7b3fea76766ca0f1aa2c107245d64d91c006f82fd65450dedb\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72\"" May 17 00:56:20.278063 env[1272]: time="2025-05-17T00:56:20.278051915Z" level=info msg="StartContainer for \"0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72\"" May 17 00:56:20.291441 systemd[1]: Started cri-containerd-0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72.scope. May 17 00:56:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.300000 audit: BPF prog-id=117 op=LOAD May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2152 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:20.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303664636364323961386530396335393761646637376664633664 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2152 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:20.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303664636364323961386530396335393761646637376664633664 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit: BPF prog-id=118 op=LOAD May 17 00:56:20.301000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025200 items=0 ppid=2152 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:20.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303664636364323961386530396335393761646637376664633664 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit: BPF prog-id=119 op=LOAD May 17 00:56:20.301000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000025248 items=0 ppid=2152 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:20.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303664636364323961386530396335393761646637376664633664 May 17 00:56:20.301000 audit: BPF prog-id=119 op=UNLOAD May 17 00:56:20.301000 audit: BPF prog-id=118 op=UNLOAD May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:20.301000 audit: BPF prog-id=120 op=LOAD May 17 00:56:20.301000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025658 items=0 ppid=2152 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:20.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303664636364323961386530396335393761646637376664633664 May 17 00:56:20.316777 env[1272]: time="2025-05-17T00:56:20.316752897Z" level=info msg="StartContainer for \"0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72\" returns successfully" May 17 00:56:22.508373 kubelet[2102]: I0517 00:56:22.508333 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7c5755cdcb-pnkq7" podStartSLOduration=3.316599373 podStartE2EDuration="5.508317977s" podCreationTimestamp="2025-05-17 00:56:17 +0000 UTC" firstStartedPulling="2025-05-17 00:56:18.069605308 +0000 UTC m=+5.470439757" lastFinishedPulling="2025-05-17 00:56:20.261323915 +0000 UTC m=+7.662158361" observedRunningTime="2025-05-17 00:56:20.869032902 +0000 UTC m=+8.269867363" watchObservedRunningTime="2025-05-17 00:56:22.508317977 +0000 UTC m=+9.909152438" May 17 00:56:25.821071 sudo[1476]: pam_unix(sudo:session): session closed for user root May 17 00:56:25.828172 kernel: kauditd_printk_skb: 360 callbacks suppressed May 17 00:56:25.828254 kernel: audit: type=1106 audit(1747443385.820:897): pid=1476 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:56:25.828274 kernel: audit: type=1104 audit(1747443385.820:898): pid=1476 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:56:25.820000 audit[1476]: USER_END pid=1476 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:56:25.820000 audit[1476]: CRED_DISP pid=1476 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:56:25.846037 sshd[1472]: pam_unix(sshd:session): session closed for user core May 17 00:56:25.853000 audit[1472]: USER_END pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:56:25.861358 kernel: audit: type=1106 audit(1747443385.853:899): pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:56:25.861402 kernel: audit: type=1104 audit(1747443385.853:900): pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:56:25.853000 audit[1472]: CRED_DISP pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:56:25.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:36564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:25.875975 systemd[1]: sshd@6-139.178.70.101:22-147.75.109.163:36564.service: Deactivated successfully. May 17 00:56:25.883301 kernel: audit: type=1131 audit(1747443385.875:901): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:36564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:56:25.876442 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:56:25.876512 systemd[1]: session-9.scope: Consumed 2.818s CPU time. May 17 00:56:25.880178 systemd-logind[1241]: Session 9 logged out. Waiting for processes to exit. May 17 00:56:25.880781 systemd-logind[1241]: Removed session 9. May 17 00:56:26.289301 kernel: audit: type=1325 audit(1747443386.282:902): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:26.289397 kernel: audit: type=1300 audit(1747443386.282:902): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff00a968e0 a2=0 a3=7fff00a968cc items=0 ppid=2246 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:26.282000 audit[2474]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:26.291536 kernel: audit: type=1327 audit(1747443386.282:902): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:26.282000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff00a968e0 a2=0 a3=7fff00a968cc items=0 ppid=2246 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:26.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:26.293000 audit[2474]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:26.300068 kernel: audit: type=1325 audit(1747443386.293:903): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:26.300150 kernel: audit: type=1300 audit(1747443386.293:903): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff00a968e0 a2=0 a3=0 items=0 ppid=2246 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:26.293000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff00a968e0 a2=0 a3=0 items=0 ppid=2246 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:26.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:26.307000 audit[2476]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:26.307000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe90ae87e0 a2=0 a3=7ffe90ae87cc items=0 ppid=2246 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:26.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:26.312000 audit[2476]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:26.312000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe90ae87e0 a2=0 a3=0 items=0 ppid=2246 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:26.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:27.745000 audit[2478]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:27.745000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffca08070b0 a2=0 a3=7ffca080709c items=0 ppid=2246 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:27.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:27.750000 audit[2478]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:27.750000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca08070b0 a2=0 a3=0 items=0 ppid=2246 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:27.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:28.104733 systemd[1]: Created slice kubepods-besteffort-pod609b621b_eec8_463b_a8d1_9449e8c871fb.slice. May 17 00:56:28.189477 kubelet[2102]: I0517 00:56:28.189454 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/609b621b-eec8-463b-a8d1-9449e8c871fb-tigera-ca-bundle\") pod \"calico-typha-5c5c7b5c8b-gz2zc\" (UID: \"609b621b-eec8-463b-a8d1-9449e8c871fb\") " pod="calico-system/calico-typha-5c5c7b5c8b-gz2zc" May 17 00:56:28.189742 kubelet[2102]: I0517 00:56:28.189731 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/609b621b-eec8-463b-a8d1-9449e8c871fb-typha-certs\") pod \"calico-typha-5c5c7b5c8b-gz2zc\" (UID: \"609b621b-eec8-463b-a8d1-9449e8c871fb\") " pod="calico-system/calico-typha-5c5c7b5c8b-gz2zc" May 17 00:56:28.189805 kubelet[2102]: I0517 00:56:28.189794 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z4wgf\" (UniqueName: \"kubernetes.io/projected/609b621b-eec8-463b-a8d1-9449e8c871fb-kube-api-access-z4wgf\") pod \"calico-typha-5c5c7b5c8b-gz2zc\" (UID: \"609b621b-eec8-463b-a8d1-9449e8c871fb\") " pod="calico-system/calico-typha-5c5c7b5c8b-gz2zc" May 17 00:56:28.414315 env[1272]: time="2025-05-17T00:56:28.414009254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5c5c7b5c8b-gz2zc,Uid:609b621b-eec8-463b-a8d1-9449e8c871fb,Namespace:calico-system,Attempt:0,}" May 17 00:56:28.492245 env[1272]: time="2025-05-17T00:56:28.488920129Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:28.492245 env[1272]: time="2025-05-17T00:56:28.488947915Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:28.492245 env[1272]: time="2025-05-17T00:56:28.488955475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:28.492245 env[1272]: time="2025-05-17T00:56:28.489023824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8089dcabd8d2080dd15d8f3bd1c20254182ab42f1e50ddde768fd67d2932c087 pid=2489 runtime=io.containerd.runc.v2 May 17 00:56:28.512144 systemd[1]: Created slice kubepods-besteffort-podd3d17822_e316_4704_8bc1_0f5466ee8782.slice. May 17 00:56:28.519711 systemd[1]: Started cri-containerd-8089dcabd8d2080dd15d8f3bd1c20254182ab42f1e50ddde768fd67d2932c087.scope. May 17 00:56:28.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.540000 audit: BPF prog-id=121 op=LOAD May 17 00:56:28.541000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2489 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383964636162643864323038306464313564386633626431633230 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2489 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383964636162643864323038306464313564386633626431633230 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.541000 audit: BPF prog-id=122 op=LOAD May 17 00:56:28.541000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000231cc0 items=0 ppid=2489 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383964636162643864323038306464313564386633626431633230 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit: BPF prog-id=123 op=LOAD May 17 00:56:28.542000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000231d08 items=0 ppid=2489 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383964636162643864323038306464313564386633626431633230 May 17 00:56:28.542000 audit: BPF prog-id=123 op=UNLOAD May 17 00:56:28.542000 audit: BPF prog-id=122 op=UNLOAD May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.542000 audit: BPF prog-id=124 op=LOAD May 17 00:56:28.542000 audit[2497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000398118 items=0 ppid=2489 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383964636162643864323038306464313564386633626431633230 May 17 00:56:28.589629 env[1272]: time="2025-05-17T00:56:28.589600913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5c5c7b5c8b-gz2zc,Uid:609b621b-eec8-463b-a8d1-9449e8c871fb,Namespace:calico-system,Attempt:0,} returns sandbox id \"8089dcabd8d2080dd15d8f3bd1c20254182ab42f1e50ddde768fd67d2932c087\"" May 17 00:56:28.590645 env[1272]: time="2025-05-17T00:56:28.590627650Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:56:28.593769 kubelet[2102]: I0517 00:56:28.593750 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8bqc7\" (UniqueName: \"kubernetes.io/projected/d3d17822-e316-4704-8bc1-0f5466ee8782-kube-api-access-8bqc7\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593813 kubelet[2102]: I0517 00:56:28.593777 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d3d17822-e316-4704-8bc1-0f5466ee8782-tigera-ca-bundle\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593813 kubelet[2102]: I0517 00:56:28.593789 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-var-lib-calico\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593813 kubelet[2102]: I0517 00:56:28.593802 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-cni-net-dir\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593813 kubelet[2102]: I0517 00:56:28.593811 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-flexvol-driver-host\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593928 kubelet[2102]: I0517 00:56:28.593821 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-lib-modules\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593928 kubelet[2102]: I0517 00:56:28.593830 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-policysync\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593928 kubelet[2102]: I0517 00:56:28.593840 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-xtables-lock\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593928 kubelet[2102]: I0517 00:56:28.593856 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d3d17822-e316-4704-8bc1-0f5466ee8782-node-certs\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.593928 kubelet[2102]: I0517 00:56:28.593866 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-cni-bin-dir\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.594031 kubelet[2102]: I0517 00:56:28.593874 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-cni-log-dir\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.594031 kubelet[2102]: I0517 00:56:28.593891 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d3d17822-e316-4704-8bc1-0f5466ee8782-var-run-calico\") pod \"calico-node-tjwm9\" (UID: \"d3d17822-e316-4704-8bc1-0f5466ee8782\") " pod="calico-system/calico-node-tjwm9" May 17 00:56:28.710738 kubelet[2102]: E0517 00:56:28.710660 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.710738 kubelet[2102]: W0517 00:56:28.710690 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.710738 kubelet[2102]: E0517 00:56:28.710717 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.760000 audit[2524]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=2524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:28.760000 audit[2524]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe0897a170 a2=0 a3=7ffe0897a15c items=0 ppid=2246 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:28.764000 audit[2524]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:28.764000 audit[2524]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe0897a170 a2=0 a3=0 items=0 ppid=2246 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.764000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:28.777460 kubelet[2102]: E0517 00:56:28.777412 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:28.817719 env[1272]: time="2025-05-17T00:56:28.817692390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tjwm9,Uid:d3d17822-e316-4704-8bc1-0f5466ee8782,Namespace:calico-system,Attempt:0,}" May 17 00:56:28.858529 env[1272]: time="2025-05-17T00:56:28.858291672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:28.858529 env[1272]: time="2025-05-17T00:56:28.858328935Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:28.858529 env[1272]: time="2025-05-17T00:56:28.858336675Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:28.864853 env[1272]: time="2025-05-17T00:56:28.858805048Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e pid=2534 runtime=io.containerd.runc.v2 May 17 00:56:28.867270 systemd[1]: Started cri-containerd-65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e.scope. May 17 00:56:28.871178 kubelet[2102]: E0517 00:56:28.870112 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871178 kubelet[2102]: W0517 00:56:28.870125 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871178 kubelet[2102]: E0517 00:56:28.870138 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871178 kubelet[2102]: E0517 00:56:28.870278 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871178 kubelet[2102]: W0517 00:56:28.870283 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871178 kubelet[2102]: E0517 00:56:28.870297 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871178 kubelet[2102]: E0517 00:56:28.870380 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871178 kubelet[2102]: W0517 00:56:28.870385 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871178 kubelet[2102]: E0517 00:56:28.870391 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871178 kubelet[2102]: E0517 00:56:28.870491 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871589 kubelet[2102]: W0517 00:56:28.870495 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871589 kubelet[2102]: E0517 00:56:28.870501 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871589 kubelet[2102]: E0517 00:56:28.870588 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871589 kubelet[2102]: W0517 00:56:28.870593 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871589 kubelet[2102]: E0517 00:56:28.870599 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871589 kubelet[2102]: E0517 00:56:28.870682 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871589 kubelet[2102]: W0517 00:56:28.870687 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871589 kubelet[2102]: E0517 00:56:28.870691 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871589 kubelet[2102]: E0517 00:56:28.870785 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871589 kubelet[2102]: W0517 00:56:28.870790 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871837 kubelet[2102]: E0517 00:56:28.870795 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871837 kubelet[2102]: E0517 00:56:28.870924 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871837 kubelet[2102]: W0517 00:56:28.870928 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871837 kubelet[2102]: E0517 00:56:28.870933 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871837 kubelet[2102]: E0517 00:56:28.871054 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871837 kubelet[2102]: W0517 00:56:28.871059 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871837 kubelet[2102]: E0517 00:56:28.871070 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.871837 kubelet[2102]: E0517 00:56:28.871438 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.871837 kubelet[2102]: W0517 00:56:28.871443 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.871837 kubelet[2102]: E0517 00:56:28.871449 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.872120 kubelet[2102]: E0517 00:56:28.872053 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.872120 kubelet[2102]: W0517 00:56:28.872059 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.872120 kubelet[2102]: E0517 00:56:28.872065 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.872298 kubelet[2102]: E0517 00:56:28.872233 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.872298 kubelet[2102]: W0517 00:56:28.872239 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.872298 kubelet[2102]: E0517 00:56:28.872244 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.872465 kubelet[2102]: E0517 00:56:28.872414 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.872465 kubelet[2102]: W0517 00:56:28.872420 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.872465 kubelet[2102]: E0517 00:56:28.872426 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.872637 kubelet[2102]: E0517 00:56:28.872573 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.872637 kubelet[2102]: W0517 00:56:28.872579 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.872637 kubelet[2102]: E0517 00:56:28.872584 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.872808 kubelet[2102]: E0517 00:56:28.872742 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.872808 kubelet[2102]: W0517 00:56:28.872748 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.872808 kubelet[2102]: E0517 00:56:28.872754 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.873018 kubelet[2102]: E0517 00:56:28.872939 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.873018 kubelet[2102]: W0517 00:56:28.872944 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.873018 kubelet[2102]: E0517 00:56:28.872950 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.873182 kubelet[2102]: E0517 00:56:28.873131 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.873182 kubelet[2102]: W0517 00:56:28.873137 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.873182 kubelet[2102]: E0517 00:56:28.873142 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit: BPF prog-id=125 op=LOAD May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2534 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623033373162383139343734333133633835623638376366656138 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2534 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623033373162383139343734333133633835623638376366656138 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit: BPF prog-id=126 op=LOAD May 17 00:56:28.880000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032f900 items=0 ppid=2534 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623033373162383139343734333133633835623638376366656138 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.880000 audit: BPF prog-id=127 op=LOAD May 17 00:56:28.880000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032f948 items=0 ppid=2534 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623033373162383139343734333133633835623638376366656138 May 17 00:56:28.881000 audit: BPF prog-id=127 op=UNLOAD May 17 00:56:28.881000 audit: BPF prog-id=126 op=UNLOAD May 17 00:56:28.881000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:28.881000 audit: BPF prog-id=128 op=LOAD May 17 00:56:28.881000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032fd58 items=0 ppid=2534 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:28.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635623033373162383139343734333133633835623638376366656138 May 17 00:56:28.888150 kubelet[2102]: E0517 00:56:28.873302 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.888150 kubelet[2102]: W0517 00:56:28.873308 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.888150 kubelet[2102]: E0517 00:56:28.873314 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.888150 kubelet[2102]: E0517 00:56:28.873413 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.888150 kubelet[2102]: W0517 00:56:28.873418 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.888150 kubelet[2102]: E0517 00:56:28.873423 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.888150 kubelet[2102]: E0517 00:56:28.873564 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.888150 kubelet[2102]: W0517 00:56:28.873568 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.888150 kubelet[2102]: E0517 00:56:28.873574 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.893585 env[1272]: time="2025-05-17T00:56:28.893558274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tjwm9,Uid:d3d17822-e316-4704-8bc1-0f5466ee8782,Namespace:calico-system,Attempt:0,} returns sandbox id \"65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e\"" May 17 00:56:28.895836 kubelet[2102]: E0517 00:56:28.895745 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.895836 kubelet[2102]: W0517 00:56:28.895755 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.895836 kubelet[2102]: E0517 00:56:28.895767 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.895836 kubelet[2102]: I0517 00:56:28.895785 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0c4e0d50-b866-40a1-83cb-4fa0aee569d4-socket-dir\") pod \"csi-node-driver-tvdvr\" (UID: \"0c4e0d50-b866-40a1-83cb-4fa0aee569d4\") " pod="calico-system/csi-node-driver-tvdvr" May 17 00:56:28.896093 kubelet[2102]: E0517 00:56:28.896003 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.896093 kubelet[2102]: W0517 00:56:28.896011 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.896093 kubelet[2102]: E0517 00:56:28.896020 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.896093 kubelet[2102]: I0517 00:56:28.896030 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0c4e0d50-b866-40a1-83cb-4fa0aee569d4-varrun\") pod \"csi-node-driver-tvdvr\" (UID: \"0c4e0d50-b866-40a1-83cb-4fa0aee569d4\") " pod="calico-system/csi-node-driver-tvdvr" May 17 00:56:28.896314 kubelet[2102]: E0517 00:56:28.896236 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.896314 kubelet[2102]: W0517 00:56:28.896243 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.896314 kubelet[2102]: E0517 00:56:28.896249 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.896314 kubelet[2102]: I0517 00:56:28.896258 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ckdq5\" (UniqueName: \"kubernetes.io/projected/0c4e0d50-b866-40a1-83cb-4fa0aee569d4-kube-api-access-ckdq5\") pod \"csi-node-driver-tvdvr\" (UID: \"0c4e0d50-b866-40a1-83cb-4fa0aee569d4\") " pod="calico-system/csi-node-driver-tvdvr" May 17 00:56:28.897618 kubelet[2102]: E0517 00:56:28.896450 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.897618 kubelet[2102]: W0517 00:56:28.896457 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.897618 kubelet[2102]: E0517 00:56:28.896463 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.897618 kubelet[2102]: I0517 00:56:28.896473 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0c4e0d50-b866-40a1-83cb-4fa0aee569d4-registration-dir\") pod \"csi-node-driver-tvdvr\" (UID: \"0c4e0d50-b866-40a1-83cb-4fa0aee569d4\") " pod="calico-system/csi-node-driver-tvdvr" May 17 00:56:28.897618 kubelet[2102]: E0517 00:56:28.896824 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.897618 kubelet[2102]: W0517 00:56:28.896838 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.897618 kubelet[2102]: E0517 00:56:28.896846 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.897618 kubelet[2102]: I0517 00:56:28.896869 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0c4e0d50-b866-40a1-83cb-4fa0aee569d4-kubelet-dir\") pod \"csi-node-driver-tvdvr\" (UID: \"0c4e0d50-b866-40a1-83cb-4fa0aee569d4\") " pod="calico-system/csi-node-driver-tvdvr" May 17 00:56:28.899685 kubelet[2102]: E0517 00:56:28.899669 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.899685 kubelet[2102]: W0517 00:56:28.899681 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.899809 kubelet[2102]: E0517 00:56:28.899798 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.899809 kubelet[2102]: W0517 00:56:28.899805 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.899915 kubelet[2102]: E0517 00:56:28.899905 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.899915 kubelet[2102]: W0517 00:56:28.899912 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.900021 kubelet[2102]: E0517 00:56:28.900009 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.900021 kubelet[2102]: W0517 00:56:28.900019 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.900112 kubelet[2102]: E0517 00:56:28.900102 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.900112 kubelet[2102]: W0517 00:56:28.900111 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.900161 kubelet[2102]: E0517 00:56:28.900119 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900212 kubelet[2102]: E0517 00:56:28.900202 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.900212 kubelet[2102]: W0517 00:56:28.900209 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.900259 kubelet[2102]: E0517 00:56:28.900217 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900259 kubelet[2102]: E0517 00:56:28.900227 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900320 kubelet[2102]: E0517 00:56:28.900311 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.900320 kubelet[2102]: W0517 00:56:28.900317 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.900372 kubelet[2102]: E0517 00:56:28.900323 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900372 kubelet[2102]: E0517 00:56:28.900332 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900425 kubelet[2102]: E0517 00:56:28.900415 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.900425 kubelet[2102]: W0517 00:56:28.900422 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.900473 kubelet[2102]: E0517 00:56:28.900427 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900760 kubelet[2102]: E0517 00:56:28.900750 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900848 kubelet[2102]: E0517 00:56:28.900838 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.900848 kubelet[2102]: W0517 00:56:28.900845 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.900960 kubelet[2102]: E0517 00:56:28.900852 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900960 kubelet[2102]: E0517 00:56:28.900862 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.900960 kubelet[2102]: E0517 00:56:28.900958 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.901018 kubelet[2102]: W0517 00:56:28.900963 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.901018 kubelet[2102]: E0517 00:56:28.900971 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.998035 kubelet[2102]: E0517 00:56:28.997960 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.998164 kubelet[2102]: W0517 00:56:28.998145 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.998227 kubelet[2102]: E0517 00:56:28.998217 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.998397 kubelet[2102]: E0517 00:56:28.998390 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.998455 kubelet[2102]: W0517 00:56:28.998444 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.998555 kubelet[2102]: E0517 00:56:28.998545 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.998729 kubelet[2102]: E0517 00:56:28.998721 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.998796 kubelet[2102]: W0517 00:56:28.998786 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.998862 kubelet[2102]: E0517 00:56:28.998854 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.999078 kubelet[2102]: E0517 00:56:28.999066 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.999078 kubelet[2102]: W0517 00:56:28.999076 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.999141 kubelet[2102]: E0517 00:56:28.999084 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.999334 kubelet[2102]: E0517 00:56:28.999227 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.999334 kubelet[2102]: W0517 00:56:28.999234 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.999334 kubelet[2102]: E0517 00:56:28.999248 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:28.999431 kubelet[2102]: E0517 00:56:28.999340 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:28.999431 kubelet[2102]: W0517 00:56:28.999344 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:28.999431 kubelet[2102]: E0517 00:56:28.999350 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.000935 kubelet[2102]: E0517 00:56:29.000926 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.001006 kubelet[2102]: W0517 00:56:29.000994 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.001116 kubelet[2102]: E0517 00:56:29.001104 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.001822 kubelet[2102]: E0517 00:56:29.001813 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.001902 kubelet[2102]: W0517 00:56:29.001890 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.001979 kubelet[2102]: E0517 00:56:29.001968 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.002177 kubelet[2102]: E0517 00:56:29.002086 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.002177 kubelet[2102]: W0517 00:56:29.002093 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.002177 kubelet[2102]: E0517 00:56:29.002103 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.002427 kubelet[2102]: E0517 00:56:29.002418 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.002427 kubelet[2102]: W0517 00:56:29.002426 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.002535 kubelet[2102]: E0517 00:56:29.002526 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.002628 kubelet[2102]: E0517 00:56:29.002529 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.002688 kubelet[2102]: W0517 00:56:29.002626 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.002729 kubelet[2102]: E0517 00:56:29.002719 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.002729 kubelet[2102]: W0517 00:56:29.002725 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.002850 kubelet[2102]: E0517 00:56:29.002734 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.002982 kubelet[2102]: E0517 00:56:29.002972 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.003072 kubelet[2102]: E0517 00:56:29.002981 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.003128 kubelet[2102]: W0517 00:56:29.003117 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.003179 kubelet[2102]: E0517 00:56:29.003171 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.003431 kubelet[2102]: E0517 00:56:29.003405 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.003489 kubelet[2102]: W0517 00:56:29.003480 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.003547 kubelet[2102]: E0517 00:56:29.003538 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.003779 kubelet[2102]: E0517 00:56:29.003680 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.003779 kubelet[2102]: W0517 00:56:29.003688 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.003779 kubelet[2102]: E0517 00:56:29.003699 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.004398 kubelet[2102]: E0517 00:56:29.004021 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.004398 kubelet[2102]: W0517 00:56:29.004029 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.004398 kubelet[2102]: E0517 00:56:29.004036 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.004398 kubelet[2102]: E0517 00:56:29.004125 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.004398 kubelet[2102]: W0517 00:56:29.004130 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.004398 kubelet[2102]: E0517 00:56:29.004135 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.005118 kubelet[2102]: E0517 00:56:29.005110 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.005184 kubelet[2102]: W0517 00:56:29.005173 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.005253 kubelet[2102]: E0517 00:56:29.005230 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.005472 kubelet[2102]: E0517 00:56:29.005464 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.005528 kubelet[2102]: W0517 00:56:29.005519 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.005583 kubelet[2102]: E0517 00:56:29.005574 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.005710 kubelet[2102]: E0517 00:56:29.005697 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.005710 kubelet[2102]: W0517 00:56:29.005707 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.005710 kubelet[2102]: E0517 00:56:29.005717 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.005915 kubelet[2102]: E0517 00:56:29.005875 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.005915 kubelet[2102]: W0517 00:56:29.005910 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.005984 kubelet[2102]: E0517 00:56:29.005917 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.006074 kubelet[2102]: E0517 00:56:29.006035 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.006074 kubelet[2102]: W0517 00:56:29.006042 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.006074 kubelet[2102]: E0517 00:56:29.006059 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.006383 kubelet[2102]: E0517 00:56:29.006250 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.006383 kubelet[2102]: W0517 00:56:29.006258 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.006383 kubelet[2102]: E0517 00:56:29.006269 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.006383 kubelet[2102]: E0517 00:56:29.006375 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.006383 kubelet[2102]: W0517 00:56:29.006380 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.006500 kubelet[2102]: E0517 00:56:29.006387 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.008896 kubelet[2102]: E0517 00:56:29.006807 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.008896 kubelet[2102]: W0517 00:56:29.006814 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.008896 kubelet[2102]: E0517 00:56:29.006821 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.012714 kubelet[2102]: E0517 00:56:29.012698 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:29.012859 kubelet[2102]: W0517 00:56:29.012834 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:29.012949 kubelet[2102]: E0517 00:56:29.012938 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:29.298295 systemd[1]: run-containerd-runc-k8s.io-8089dcabd8d2080dd15d8f3bd1c20254182ab42f1e50ddde768fd67d2932c087-runc.7bobBS.mount: Deactivated successfully. May 17 00:56:30.062312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2454058488.mount: Deactivated successfully. May 17 00:56:30.813886 kubelet[2102]: E0517 00:56:30.813841 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:32.813647 kubelet[2102]: E0517 00:56:32.813620 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:33.068035 env[1272]: time="2025-05-17T00:56:33.067944368Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:33.080221 env[1272]: time="2025-05-17T00:56:33.080193140Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:33.089442 env[1272]: time="2025-05-17T00:56:33.089419087Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:33.095419 env[1272]: time="2025-05-17T00:56:33.095396357Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:33.095671 env[1272]: time="2025-05-17T00:56:33.095655852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:56:33.098197 env[1272]: time="2025-05-17T00:56:33.098171988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:56:33.110519 env[1272]: time="2025-05-17T00:56:33.110485672Z" level=info msg="CreateContainer within sandbox \"8089dcabd8d2080dd15d8f3bd1c20254182ab42f1e50ddde768fd67d2932c087\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:56:33.120064 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount250478856.mount: Deactivated successfully. May 17 00:56:33.130240 env[1272]: time="2025-05-17T00:56:33.130195046Z" level=info msg="CreateContainer within sandbox \"8089dcabd8d2080dd15d8f3bd1c20254182ab42f1e50ddde768fd67d2932c087\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"73b3e20b30c80d71c975a5749288f362f8247b0f1bcebe93067a4d4b145d72cf\"" May 17 00:56:33.130825 env[1272]: time="2025-05-17T00:56:33.130810523Z" level=info msg="StartContainer for \"73b3e20b30c80d71c975a5749288f362f8247b0f1bcebe93067a4d4b145d72cf\"" May 17 00:56:33.143893 systemd[1]: Started cri-containerd-73b3e20b30c80d71c975a5749288f362f8247b0f1bcebe93067a4d4b145d72cf.scope. May 17 00:56:33.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.159456 kernel: kauditd_printk_skb: 133 callbacks suppressed May 17 00:56:33.159519 kernel: audit: type=1400 audit(1747443393.154:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.168165 kernel: audit: type=1400 audit(1747443393.154:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.168241 kernel: audit: type=1400 audit(1747443393.154:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.168898 kernel: audit: type=1400 audit(1747443393.154:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.173812 kernel: audit: type=1400 audit(1747443393.154:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.183898 kernel: audit: type=1400 audit(1747443393.154:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.183946 kernel: audit: type=1400 audit(1747443393.154:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.189426 kernel: audit: type=1400 audit(1747443393.154:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.189466 kernel: audit: type=1400 audit(1747443393.154:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.189482 kernel: audit: type=1400 audit(1747443393.154:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.154000 audit: BPF prog-id=129 op=LOAD May 17 00:56:33.160000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2489 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:33.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623365323062333063383064373163393735613537343932383866 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2489 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:33.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623365323062333063383064373163393735613537343932383866 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.160000 audit: BPF prog-id=130 op=LOAD May 17 00:56:33.160000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002d9d10 items=0 ppid=2489 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:33.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623365323062333063383064373163393735613537343932383866 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit: BPF prog-id=131 op=LOAD May 17 00:56:33.161000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002d9d58 items=0 ppid=2489 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:33.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623365323062333063383064373163393735613537343932383866 May 17 00:56:33.161000 audit: BPF prog-id=131 op=UNLOAD May 17 00:56:33.161000 audit: BPF prog-id=130 op=UNLOAD May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:33.161000 audit: BPF prog-id=132 op=LOAD May 17 00:56:33.161000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c2168 items=0 ppid=2489 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:33.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623365323062333063383064373163393735613537343932383866 May 17 00:56:33.292708 env[1272]: time="2025-05-17T00:56:33.292677347Z" level=info msg="StartContainer for \"73b3e20b30c80d71c975a5749288f362f8247b0f1bcebe93067a4d4b145d72cf\" returns successfully" May 17 00:56:33.911914 kubelet[2102]: E0517 00:56:33.911888 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912244 kubelet[2102]: W0517 00:56:33.911905 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912244 kubelet[2102]: E0517 00:56:33.911955 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912244 kubelet[2102]: E0517 00:56:33.912107 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912244 kubelet[2102]: W0517 00:56:33.912112 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912244 kubelet[2102]: E0517 00:56:33.912118 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912244 kubelet[2102]: E0517 00:56:33.912196 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912244 kubelet[2102]: W0517 00:56:33.912201 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912244 kubelet[2102]: E0517 00:56:33.912206 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912399 kubelet[2102]: E0517 00:56:33.912280 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912399 kubelet[2102]: W0517 00:56:33.912285 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912399 kubelet[2102]: E0517 00:56:33.912289 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912399 kubelet[2102]: E0517 00:56:33.912367 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912399 kubelet[2102]: W0517 00:56:33.912371 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912399 kubelet[2102]: E0517 00:56:33.912376 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912509 kubelet[2102]: E0517 00:56:33.912448 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912509 kubelet[2102]: W0517 00:56:33.912452 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912509 kubelet[2102]: E0517 00:56:33.912456 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912565 kubelet[2102]: E0517 00:56:33.912526 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912565 kubelet[2102]: W0517 00:56:33.912530 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912565 kubelet[2102]: E0517 00:56:33.912534 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912640 kubelet[2102]: E0517 00:56:33.912604 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912640 kubelet[2102]: W0517 00:56:33.912608 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912640 kubelet[2102]: E0517 00:56:33.912613 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912695 kubelet[2102]: E0517 00:56:33.912687 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912695 kubelet[2102]: W0517 00:56:33.912691 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912734 kubelet[2102]: E0517 00:56:33.912696 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912777 kubelet[2102]: E0517 00:56:33.912767 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912777 kubelet[2102]: W0517 00:56:33.912773 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912846 kubelet[2102]: E0517 00:56:33.912778 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912869 kubelet[2102]: E0517 00:56:33.912864 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912897 kubelet[2102]: W0517 00:56:33.912869 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.912897 kubelet[2102]: E0517 00:56:33.912873 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.912961 kubelet[2102]: E0517 00:56:33.912952 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.912961 kubelet[2102]: W0517 00:56:33.912957 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.913003 kubelet[2102]: E0517 00:56:33.912962 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.913044 kubelet[2102]: E0517 00:56:33.913035 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.913044 kubelet[2102]: W0517 00:56:33.913042 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.913095 kubelet[2102]: E0517 00:56:33.913049 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.913127 kubelet[2102]: E0517 00:56:33.913119 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.913127 kubelet[2102]: W0517 00:56:33.913123 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.913171 kubelet[2102]: E0517 00:56:33.913128 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.913204 kubelet[2102]: E0517 00:56:33.913195 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.913204 kubelet[2102]: W0517 00:56:33.913201 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.913256 kubelet[2102]: E0517 00:56:33.913205 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.937573 kubelet[2102]: E0517 00:56:33.937551 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.937573 kubelet[2102]: W0517 00:56:33.937567 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.937573 kubelet[2102]: E0517 00:56:33.937581 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.937722 kubelet[2102]: E0517 00:56:33.937699 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.937722 kubelet[2102]: W0517 00:56:33.937704 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.937722 kubelet[2102]: E0517 00:56:33.937710 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.937863 kubelet[2102]: E0517 00:56:33.937793 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.937863 kubelet[2102]: W0517 00:56:33.937797 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.937863 kubelet[2102]: E0517 00:56:33.937802 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.937967 kubelet[2102]: E0517 00:56:33.937916 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.937967 kubelet[2102]: W0517 00:56:33.937921 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.937967 kubelet[2102]: E0517 00:56:33.937928 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.938025 kubelet[2102]: E0517 00:56:33.938000 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.938025 kubelet[2102]: W0517 00:56:33.938004 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.938025 kubelet[2102]: E0517 00:56:33.938008 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.938084 kubelet[2102]: E0517 00:56:33.938075 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.938084 kubelet[2102]: W0517 00:56:33.938079 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.938123 kubelet[2102]: E0517 00:56:33.938084 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.938181 kubelet[2102]: E0517 00:56:33.938167 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.938181 kubelet[2102]: W0517 00:56:33.938174 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.938242 kubelet[2102]: E0517 00:56:33.938184 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.938481 kubelet[2102]: E0517 00:56:33.938468 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.938481 kubelet[2102]: W0517 00:56:33.938479 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.938548 kubelet[2102]: E0517 00:56:33.938489 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.938606 kubelet[2102]: E0517 00:56:33.938594 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.938606 kubelet[2102]: W0517 00:56:33.938604 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.938670 kubelet[2102]: E0517 00:56:33.938614 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.938696 kubelet[2102]: E0517 00:56:33.938691 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945235 kubelet[2102]: W0517 00:56:33.938695 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945235 kubelet[2102]: E0517 00:56:33.938700 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.945235 kubelet[2102]: E0517 00:56:33.938767 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945235 kubelet[2102]: W0517 00:56:33.938771 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945235 kubelet[2102]: E0517 00:56:33.938775 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.945235 kubelet[2102]: E0517 00:56:33.938874 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945235 kubelet[2102]: W0517 00:56:33.938888 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945235 kubelet[2102]: E0517 00:56:33.938899 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.945235 kubelet[2102]: E0517 00:56:33.939053 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945235 kubelet[2102]: W0517 00:56:33.939063 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945441 kubelet[2102]: E0517 00:56:33.939068 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.945441 kubelet[2102]: E0517 00:56:33.939164 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945441 kubelet[2102]: W0517 00:56:33.939168 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945441 kubelet[2102]: E0517 00:56:33.939173 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.945441 kubelet[2102]: E0517 00:56:33.939259 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945441 kubelet[2102]: W0517 00:56:33.939263 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945441 kubelet[2102]: E0517 00:56:33.939268 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.945441 kubelet[2102]: E0517 00:56:33.939350 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945441 kubelet[2102]: W0517 00:56:33.939354 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945441 kubelet[2102]: E0517 00:56:33.939359 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.945644 kubelet[2102]: E0517 00:56:33.939459 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945644 kubelet[2102]: W0517 00:56:33.939464 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945644 kubelet[2102]: E0517 00:56:33.939469 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:33.945644 kubelet[2102]: E0517 00:56:33.939662 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:33.945644 kubelet[2102]: W0517 00:56:33.939669 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:33.945644 kubelet[2102]: E0517 00:56:33.939674 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.812912 kubelet[2102]: E0517 00:56:34.812708 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:34.883604 kubelet[2102]: I0517 00:56:34.883579 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:56:34.919701 kubelet[2102]: E0517 00:56:34.919629 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.919701 kubelet[2102]: W0517 00:56:34.919643 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.919701 kubelet[2102]: E0517 00:56:34.919656 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925103 kubelet[2102]: E0517 00:56:34.919939 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925103 kubelet[2102]: W0517 00:56:34.919946 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925103 kubelet[2102]: E0517 00:56:34.919952 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925103 kubelet[2102]: E0517 00:56:34.920053 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925103 kubelet[2102]: W0517 00:56:34.920058 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925103 kubelet[2102]: E0517 00:56:34.920067 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925103 kubelet[2102]: E0517 00:56:34.920165 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925103 kubelet[2102]: W0517 00:56:34.920170 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925103 kubelet[2102]: E0517 00:56:34.920176 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925103 kubelet[2102]: E0517 00:56:34.920349 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925327 kubelet[2102]: W0517 00:56:34.920354 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925327 kubelet[2102]: E0517 00:56:34.920359 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925327 kubelet[2102]: E0517 00:56:34.920441 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925327 kubelet[2102]: W0517 00:56:34.920446 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925327 kubelet[2102]: E0517 00:56:34.920451 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925327 kubelet[2102]: E0517 00:56:34.920535 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925327 kubelet[2102]: W0517 00:56:34.920539 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925327 kubelet[2102]: E0517 00:56:34.920544 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925327 kubelet[2102]: E0517 00:56:34.920624 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925327 kubelet[2102]: W0517 00:56:34.920629 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925528 kubelet[2102]: E0517 00:56:34.920633 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925528 kubelet[2102]: E0517 00:56:34.920720 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925528 kubelet[2102]: W0517 00:56:34.920724 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925528 kubelet[2102]: E0517 00:56:34.920729 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925528 kubelet[2102]: E0517 00:56:34.920810 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925528 kubelet[2102]: W0517 00:56:34.920815 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925528 kubelet[2102]: E0517 00:56:34.920820 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925528 kubelet[2102]: E0517 00:56:34.920909 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925528 kubelet[2102]: W0517 00:56:34.920914 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925528 kubelet[2102]: E0517 00:56:34.920919 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925723 kubelet[2102]: E0517 00:56:34.921005 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925723 kubelet[2102]: W0517 00:56:34.921010 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925723 kubelet[2102]: E0517 00:56:34.921015 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925723 kubelet[2102]: E0517 00:56:34.921100 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925723 kubelet[2102]: W0517 00:56:34.921104 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925723 kubelet[2102]: E0517 00:56:34.921109 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925723 kubelet[2102]: E0517 00:56:34.921188 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925723 kubelet[2102]: W0517 00:56:34.921192 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925723 kubelet[2102]: E0517 00:56:34.921196 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.925723 kubelet[2102]: E0517 00:56:34.921275 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.925911 kubelet[2102]: W0517 00:56:34.921280 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.925911 kubelet[2102]: E0517 00:56:34.921284 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.944597 kubelet[2102]: E0517 00:56:34.944577 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.944597 kubelet[2102]: W0517 00:56:34.944593 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.944712 kubelet[2102]: E0517 00:56:34.944608 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.944766 kubelet[2102]: E0517 00:56:34.944751 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.944766 kubelet[2102]: W0517 00:56:34.944762 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.944841 kubelet[2102]: E0517 00:56:34.944769 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.944952 kubelet[2102]: E0517 00:56:34.944935 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.944952 kubelet[2102]: W0517 00:56:34.944948 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.945032 kubelet[2102]: E0517 00:56:34.944964 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.945112 kubelet[2102]: E0517 00:56:34.945098 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.945112 kubelet[2102]: W0517 00:56:34.945108 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.945192 kubelet[2102]: E0517 00:56:34.945118 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.945287 kubelet[2102]: E0517 00:56:34.945270 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.945287 kubelet[2102]: W0517 00:56:34.945282 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.945367 kubelet[2102]: E0517 00:56:34.945290 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.945453 kubelet[2102]: E0517 00:56:34.945438 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.945453 kubelet[2102]: W0517 00:56:34.945449 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.945527 kubelet[2102]: E0517 00:56:34.945460 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.945651 kubelet[2102]: E0517 00:56:34.945635 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.945651 kubelet[2102]: W0517 00:56:34.945647 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.945726 kubelet[2102]: E0517 00:56:34.945658 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.946008 kubelet[2102]: E0517 00:56:34.945994 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.946008 kubelet[2102]: W0517 00:56:34.946004 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.946103 kubelet[2102]: E0517 00:56:34.946016 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.946173 kubelet[2102]: E0517 00:56:34.946160 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.946173 kubelet[2102]: W0517 00:56:34.946168 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.946252 kubelet[2102]: E0517 00:56:34.946206 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.946414 kubelet[2102]: E0517 00:56:34.946398 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.946414 kubelet[2102]: W0517 00:56:34.946409 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.946509 kubelet[2102]: E0517 00:56:34.946458 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.946580 kubelet[2102]: E0517 00:56:34.946568 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.946580 kubelet[2102]: W0517 00:56:34.946577 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.946662 kubelet[2102]: E0517 00:56:34.946587 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.946750 kubelet[2102]: E0517 00:56:34.946738 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.946750 kubelet[2102]: W0517 00:56:34.946747 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.946826 kubelet[2102]: E0517 00:56:34.946773 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.946960 kubelet[2102]: E0517 00:56:34.946946 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.946960 kubelet[2102]: W0517 00:56:34.946959 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.947040 kubelet[2102]: E0517 00:56:34.946989 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.947300 kubelet[2102]: E0517 00:56:34.947260 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.947300 kubelet[2102]: W0517 00:56:34.947270 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.947300 kubelet[2102]: E0517 00:56:34.947286 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.947468 kubelet[2102]: E0517 00:56:34.947450 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.947508 kubelet[2102]: W0517 00:56:34.947480 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.947508 kubelet[2102]: E0517 00:56:34.947495 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.947617 kubelet[2102]: E0517 00:56:34.947606 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.947617 kubelet[2102]: W0517 00:56:34.947614 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.947697 kubelet[2102]: E0517 00:56:34.947623 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.947737 kubelet[2102]: E0517 00:56:34.947730 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.947737 kubelet[2102]: W0517 00:56:34.947736 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.947807 kubelet[2102]: E0517 00:56:34.947742 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.947960 kubelet[2102]: E0517 00:56:34.947948 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:56:34.947960 kubelet[2102]: W0517 00:56:34.947957 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:56:34.948030 kubelet[2102]: E0517 00:56:34.947965 2102 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:56:34.967872 env[1272]: time="2025-05-17T00:56:34.967831596Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:34.985457 env[1272]: time="2025-05-17T00:56:34.985412601Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:34.990425 env[1272]: time="2025-05-17T00:56:34.990405778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:34.995864 env[1272]: time="2025-05-17T00:56:34.995843480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:34.996395 env[1272]: time="2025-05-17T00:56:34.996377399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:56:34.999294 env[1272]: time="2025-05-17T00:56:34.999264694Z" level=info msg="CreateContainer within sandbox \"65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:56:35.014031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3470204094.mount: Deactivated successfully. May 17 00:56:35.019411 env[1272]: time="2025-05-17T00:56:35.019375881Z" level=info msg="CreateContainer within sandbox \"65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79\"" May 17 00:56:35.020193 env[1272]: time="2025-05-17T00:56:35.020170051Z" level=info msg="StartContainer for \"2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79\"" May 17 00:56:35.050011 systemd[1]: Started cri-containerd-2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79.scope. May 17 00:56:35.064000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.064000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6ecee03858 items=0 ppid=2534 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:35.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383332396137313530646664333861393431323335636237316235 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.068000 audit: BPF prog-id=133 op=LOAD May 17 00:56:35.068000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000335d88 items=0 ppid=2534 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:35.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383332396137313530646664333861393431323335636237316235 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit: BPF prog-id=134 op=LOAD May 17 00:56:35.069000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000335dd8 items=0 ppid=2534 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:35.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383332396137313530646664333861393431323335636237316235 May 17 00:56:35.069000 audit: BPF prog-id=134 op=UNLOAD May 17 00:56:35.069000 audit: BPF prog-id=133 op=UNLOAD May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:35.069000 audit: BPF prog-id=135 op=LOAD May 17 00:56:35.069000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000335e68 items=0 ppid=2534 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:35.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261383332396137313530646664333861393431323335636237316235 May 17 00:56:35.093550 systemd[1]: cri-containerd-2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79.scope: Deactivated successfully. May 17 00:56:35.093723 env[1272]: time="2025-05-17T00:56:35.093701431Z" level=info msg="StartContainer for \"2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79\" returns successfully" May 17 00:56:35.095000 audit: BPF prog-id=135 op=UNLOAD May 17 00:56:35.099949 systemd[1]: run-containerd-runc-k8s.io-2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79-runc.Sj1Krq.mount: Deactivated successfully. May 17 00:56:35.109285 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79-rootfs.mount: Deactivated successfully. May 17 00:56:35.620537 env[1272]: time="2025-05-17T00:56:35.620499456Z" level=info msg="shim disconnected" id=2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79 May 17 00:56:35.620728 env[1272]: time="2025-05-17T00:56:35.620713011Z" level=warning msg="cleaning up after shim disconnected" id=2a8329a7150dfd38a941235cb71b53ee1976107a7a3a3adda2d0f91556c48a79 namespace=k8s.io May 17 00:56:35.620793 env[1272]: time="2025-05-17T00:56:35.620779403Z" level=info msg="cleaning up dead shim" May 17 00:56:35.628982 env[1272]: time="2025-05-17T00:56:35.628936643Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:56:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2783 runtime=io.containerd.runc.v2\n" May 17 00:56:35.886608 env[1272]: time="2025-05-17T00:56:35.886540813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:56:35.905031 kubelet[2102]: I0517 00:56:35.904994 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5c5c7b5c8b-gz2zc" podStartSLOduration=3.39888375 podStartE2EDuration="7.904978621s" podCreationTimestamp="2025-05-17 00:56:28 +0000 UTC" firstStartedPulling="2025-05-17 00:56:28.590355167 +0000 UTC m=+15.991189614" lastFinishedPulling="2025-05-17 00:56:33.096450038 +0000 UTC m=+20.497284485" observedRunningTime="2025-05-17 00:56:33.896411166 +0000 UTC m=+21.297245624" watchObservedRunningTime="2025-05-17 00:56:35.904978621 +0000 UTC m=+23.305813072" May 17 00:56:36.813483 kubelet[2102]: E0517 00:56:36.813450 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:38.061932 kubelet[2102]: I0517 00:56:38.061619 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:56:38.152000 audit[2801]: NETFILTER_CFG table=filter:97 family=2 entries=21 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:38.152000 audit[2801]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff93572b30 a2=0 a3=7fff93572b1c items=0 ppid=2246 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:38.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:38.157000 audit[2801]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:38.159037 kernel: kauditd_printk_skb: 94 callbacks suppressed May 17 00:56:38.159080 kernel: audit: type=1325 audit(1747443398.157:972): table=nat:98 family=2 entries=19 op=nft_register_chain pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:38.157000 audit[2801]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff93572b30 a2=0 a3=7fff93572b1c items=0 ppid=2246 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:38.164764 kernel: audit: type=1300 audit(1747443398.157:972): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff93572b30 a2=0 a3=7fff93572b1c items=0 ppid=2246 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:38.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:38.167895 kernel: audit: type=1327 audit(1747443398.157:972): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:38.813973 kubelet[2102]: E0517 00:56:38.813940 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:40.812916 kubelet[2102]: E0517 00:56:40.812636 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:42.804730 env[1272]: time="2025-05-17T00:56:42.804654645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:42.813313 kubelet[2102]: E0517 00:56:42.813283 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:42.919978 env[1272]: time="2025-05-17T00:56:42.919941623Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:42.928580 env[1272]: time="2025-05-17T00:56:42.928561889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:42.941757 env[1272]: time="2025-05-17T00:56:42.941709562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:42.942194 env[1272]: time="2025-05-17T00:56:42.942170302Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:56:42.954862 env[1272]: time="2025-05-17T00:56:42.954838349Z" level=info msg="CreateContainer within sandbox \"65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:56:42.962127 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount162319270.mount: Deactivated successfully. May 17 00:56:42.965063 env[1272]: time="2025-05-17T00:56:42.965030955Z" level=info msg="CreateContainer within sandbox \"65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212\"" May 17 00:56:42.965584 env[1272]: time="2025-05-17T00:56:42.965565003Z" level=info msg="StartContainer for \"7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212\"" May 17 00:56:42.980622 systemd[1]: Started cri-containerd-7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212.scope. May 17 00:56:42.983717 systemd[1]: run-containerd-runc-k8s.io-7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212-runc.Gjl18c.mount: Deactivated successfully. May 17 00:56:43.000000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.000000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc82066d638 items=0 ppid=2534 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:43.008725 kernel: audit: type=1400 audit(1747443403.000:973): avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.008871 kernel: audit: type=1300 audit(1747443403.000:973): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc82066d638 items=0 ppid=2534 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:43.012849 kernel: audit: type=1327 audit(1747443403.000:973): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303662373936653462346134646632666433373764346530376530 May 17 00:56:43.012935 kernel: audit: type=1400 audit(1747443403.001:974): avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303662373936653462346134646632666433373764346530376530 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.018152 kernel: audit: type=1400 audit(1747443403.001:974): avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.018236 kernel: audit: type=1400 audit(1747443403.001:974): avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.020762 kernel: audit: type=1400 audit(1747443403.001:974): avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.001000 audit: BPF prog-id=136 op=LOAD May 17 00:56:43.001000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d5bb8 items=0 ppid=2534 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:43.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303662373936653462346134646632666433373764346530376530 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.007000 audit: BPF prog-id=137 op=LOAD May 17 00:56:43.007000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d5c08 items=0 ppid=2534 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:43.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303662373936653462346134646632666433373764346530376530 May 17 00:56:43.017000 audit: BPF prog-id=137 op=UNLOAD May 17 00:56:43.017000 audit: BPF prog-id=136 op=UNLOAD May 17 00:56:43.017000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:43.017000 audit: BPF prog-id=138 op=LOAD May 17 00:56:43.017000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002d5c98 items=0 ppid=2534 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:43.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303662373936653462346134646632666433373764346530376530 May 17 00:56:43.049334 env[1272]: time="2025-05-17T00:56:43.049306926Z" level=info msg="StartContainer for \"7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212\" returns successfully" May 17 00:56:44.609688 env[1272]: time="2025-05-17T00:56:44.609617117Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:56:44.612034 systemd[1]: cri-containerd-7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212.scope: Deactivated successfully. May 17 00:56:44.615000 audit: BPF prog-id=138 op=UNLOAD May 17 00:56:44.617736 kernel: kauditd_printk_skb: 36 callbacks suppressed May 17 00:56:44.617804 kernel: audit: type=1334 audit(1747443404.615:979): prog-id=138 op=UNLOAD May 17 00:56:44.626923 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212-rootfs.mount: Deactivated successfully. May 17 00:56:44.634037 env[1272]: time="2025-05-17T00:56:44.634008195Z" level=info msg="shim disconnected" id=7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212 May 17 00:56:44.634266 env[1272]: time="2025-05-17T00:56:44.634250673Z" level=warning msg="cleaning up after shim disconnected" id=7806b796e4b4a4df2fd377d4e07e08014d6f98f9bb346594874b23cf6277b212 namespace=k8s.io May 17 00:56:44.634337 env[1272]: time="2025-05-17T00:56:44.634326375Z" level=info msg="cleaning up dead shim" May 17 00:56:44.639609 env[1272]: time="2025-05-17T00:56:44.639584634Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:56:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2850 runtime=io.containerd.runc.v2\n" May 17 00:56:44.677904 kubelet[2102]: I0517 00:56:44.668989 2102 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:56:44.725234 systemd[1]: Created slice kubepods-burstable-poddf85e1d5_d638_465a_a2ca_52d913410447.slice. May 17 00:56:44.742248 systemd[1]: Created slice kubepods-besteffort-poda96f418b_1185_4aa2_85fc_983c990d5025.slice. May 17 00:56:44.748575 systemd[1]: Created slice kubepods-burstable-pod875b9cdb_b513_48de_839e_dca19733e94b.slice. May 17 00:56:44.755378 systemd[1]: Created slice kubepods-besteffort-pod9fd78396_3dd9_4786_9847_c14d5b321470.slice. May 17 00:56:44.778527 systemd[1]: Created slice kubepods-besteffort-podbc383263_3126_428e_9f00_fa7e07ca5fdd.slice. May 17 00:56:44.794959 systemd[1]: Created slice kubepods-besteffort-podb161dca0_0f94_492d_84b9_20d1de419b67.slice. May 17 00:56:44.799145 systemd[1]: Created slice kubepods-besteffort-podaa6e114e_decb_446a_8bda_8dbdb7e8f8a5.slice. May 17 00:56:44.816521 systemd[1]: Created slice kubepods-besteffort-pod0c4e0d50_b866_40a1_83cb_4fa0aee569d4.slice. May 17 00:56:44.818428 env[1272]: time="2025-05-17T00:56:44.818400288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tvdvr,Uid:0c4e0d50-b866-40a1-83cb-4fa0aee569d4,Namespace:calico-system,Attempt:0,}" May 17 00:56:44.899013 env[1272]: time="2025-05-17T00:56:44.898758922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:56:44.910686 kubelet[2102]: I0517 00:56:44.910661 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rcnxx\" (UniqueName: \"kubernetes.io/projected/bc383263-3126-428e-9f00-fa7e07ca5fdd-kube-api-access-rcnxx\") pod \"whisker-59b76bc5b6-mrsfm\" (UID: \"bc383263-3126-428e-9f00-fa7e07ca5fdd\") " pod="calico-system/whisker-59b76bc5b6-mrsfm" May 17 00:56:44.912106 kubelet[2102]: I0517 00:56:44.910868 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a96f418b-1185-4aa2-85fc-983c990d5025-tigera-ca-bundle\") pod \"calico-kube-controllers-5759b4fc68-kk5rr\" (UID: \"a96f418b-1185-4aa2-85fc-983c990d5025\") " pod="calico-system/calico-kube-controllers-5759b4fc68-kk5rr" May 17 00:56:44.912237 kubelet[2102]: I0517 00:56:44.912223 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/aa6e114e-decb-446a-8bda-8dbdb7e8f8a5-config\") pod \"goldmane-8f77d7b6c-ws46h\" (UID: \"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5\") " pod="calico-system/goldmane-8f77d7b6c-ws46h" May 17 00:56:44.912447 kubelet[2102]: I0517 00:56:44.912433 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/aa6e114e-decb-446a-8bda-8dbdb7e8f8a5-goldmane-ca-bundle\") pod \"goldmane-8f77d7b6c-ws46h\" (UID: \"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5\") " pod="calico-system/goldmane-8f77d7b6c-ws46h" May 17 00:56:44.912559 kubelet[2102]: I0517 00:56:44.912544 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/df85e1d5-d638-465a-a2ca-52d913410447-config-volume\") pod \"coredns-7c65d6cfc9-x7hw7\" (UID: \"df85e1d5-d638-465a-a2ca-52d913410447\") " pod="kube-system/coredns-7c65d6cfc9-x7hw7" May 17 00:56:44.912661 kubelet[2102]: I0517 00:56:44.912626 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwn49\" (UniqueName: \"kubernetes.io/projected/9fd78396-3dd9-4786-9847-c14d5b321470-kube-api-access-pwn49\") pod \"calico-apiserver-68867d4df7-67kdl\" (UID: \"9fd78396-3dd9-4786-9847-c14d5b321470\") " pod="calico-apiserver/calico-apiserver-68867d4df7-67kdl" May 17 00:56:44.912752 kubelet[2102]: I0517 00:56:44.912741 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qxxz6\" (UniqueName: \"kubernetes.io/projected/b161dca0-0f94-492d-84b9-20d1de419b67-kube-api-access-qxxz6\") pod \"calico-apiserver-68867d4df7-cxrk5\" (UID: \"b161dca0-0f94-492d-84b9-20d1de419b67\") " pod="calico-apiserver/calico-apiserver-68867d4df7-cxrk5" May 17 00:56:44.912848 kubelet[2102]: I0517 00:56:44.912836 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7s9tr\" (UniqueName: \"kubernetes.io/projected/a96f418b-1185-4aa2-85fc-983c990d5025-kube-api-access-7s9tr\") pod \"calico-kube-controllers-5759b4fc68-kk5rr\" (UID: \"a96f418b-1185-4aa2-85fc-983c990d5025\") " pod="calico-system/calico-kube-controllers-5759b4fc68-kk5rr" May 17 00:56:44.912939 kubelet[2102]: I0517 00:56:44.912928 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/875b9cdb-b513-48de-839e-dca19733e94b-config-volume\") pod \"coredns-7c65d6cfc9-9pqww\" (UID: \"875b9cdb-b513-48de-839e-dca19733e94b\") " pod="kube-system/coredns-7c65d6cfc9-9pqww" May 17 00:56:44.913016 kubelet[2102]: I0517 00:56:44.913005 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-57q9n\" (UniqueName: \"kubernetes.io/projected/df85e1d5-d638-465a-a2ca-52d913410447-kube-api-access-57q9n\") pod \"coredns-7c65d6cfc9-x7hw7\" (UID: \"df85e1d5-d638-465a-a2ca-52d913410447\") " pod="kube-system/coredns-7c65d6cfc9-x7hw7" May 17 00:56:44.913087 kubelet[2102]: I0517 00:56:44.913076 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/aa6e114e-decb-446a-8bda-8dbdb7e8f8a5-goldmane-key-pair\") pod \"goldmane-8f77d7b6c-ws46h\" (UID: \"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5\") " pod="calico-system/goldmane-8f77d7b6c-ws46h" May 17 00:56:44.913155 kubelet[2102]: I0517 00:56:44.913142 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tgwtj\" (UniqueName: \"kubernetes.io/projected/875b9cdb-b513-48de-839e-dca19733e94b-kube-api-access-tgwtj\") pod \"coredns-7c65d6cfc9-9pqww\" (UID: \"875b9cdb-b513-48de-839e-dca19733e94b\") " pod="kube-system/coredns-7c65d6cfc9-9pqww" May 17 00:56:44.913999 kubelet[2102]: I0517 00:56:44.913337 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9fd78396-3dd9-4786-9847-c14d5b321470-calico-apiserver-certs\") pod \"calico-apiserver-68867d4df7-67kdl\" (UID: \"9fd78396-3dd9-4786-9847-c14d5b321470\") " pod="calico-apiserver/calico-apiserver-68867d4df7-67kdl" May 17 00:56:44.913999 kubelet[2102]: I0517 00:56:44.913356 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bc383263-3126-428e-9f00-fa7e07ca5fdd-whisker-ca-bundle\") pod \"whisker-59b76bc5b6-mrsfm\" (UID: \"bc383263-3126-428e-9f00-fa7e07ca5fdd\") " pod="calico-system/whisker-59b76bc5b6-mrsfm" May 17 00:56:44.913999 kubelet[2102]: I0517 00:56:44.913384 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/bc383263-3126-428e-9f00-fa7e07ca5fdd-whisker-backend-key-pair\") pod \"whisker-59b76bc5b6-mrsfm\" (UID: \"bc383263-3126-428e-9f00-fa7e07ca5fdd\") " pod="calico-system/whisker-59b76bc5b6-mrsfm" May 17 00:56:44.913999 kubelet[2102]: I0517 00:56:44.913398 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jjdfq\" (UniqueName: \"kubernetes.io/projected/aa6e114e-decb-446a-8bda-8dbdb7e8f8a5-kube-api-access-jjdfq\") pod \"goldmane-8f77d7b6c-ws46h\" (UID: \"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5\") " pod="calico-system/goldmane-8f77d7b6c-ws46h" May 17 00:56:44.913999 kubelet[2102]: I0517 00:56:44.913412 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b161dca0-0f94-492d-84b9-20d1de419b67-calico-apiserver-certs\") pod \"calico-apiserver-68867d4df7-cxrk5\" (UID: \"b161dca0-0f94-492d-84b9-20d1de419b67\") " pod="calico-apiserver/calico-apiserver-68867d4df7-cxrk5" May 17 00:56:45.057961 env[1272]: time="2025-05-17T00:56:45.057835468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68867d4df7-67kdl,Uid:9fd78396-3dd9-4786-9847-c14d5b321470,Namespace:calico-apiserver,Attempt:0,}" May 17 00:56:45.094031 env[1272]: time="2025-05-17T00:56:45.093747182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-59b76bc5b6-mrsfm,Uid:bc383263-3126-428e-9f00-fa7e07ca5fdd,Namespace:calico-system,Attempt:0,}" May 17 00:56:45.097656 env[1272]: time="2025-05-17T00:56:45.097625287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68867d4df7-cxrk5,Uid:b161dca0-0f94-492d-84b9-20d1de419b67,Namespace:calico-apiserver,Attempt:0,}" May 17 00:56:45.101325 env[1272]: time="2025-05-17T00:56:45.101229291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-ws46h,Uid:aa6e114e-decb-446a-8bda-8dbdb7e8f8a5,Namespace:calico-system,Attempt:0,}" May 17 00:56:45.249172 env[1272]: time="2025-05-17T00:56:45.249115985Z" level=error msg="Failed to destroy network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.249408 env[1272]: time="2025-05-17T00:56:45.249381375Z" level=error msg="encountered an error cleaning up failed sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.249448 env[1272]: time="2025-05-17T00:56:45.249420909Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-ws46h,Uid:aa6e114e-decb-446a-8bda-8dbdb7e8f8a5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.249526 env[1272]: time="2025-05-17T00:56:45.249507693Z" level=error msg="Failed to destroy network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.249714 env[1272]: time="2025-05-17T00:56:45.249696480Z" level=error msg="encountered an error cleaning up failed sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.249765 env[1272]: time="2025-05-17T00:56:45.249721573Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68867d4df7-67kdl,Uid:9fd78396-3dd9-4786-9847-c14d5b321470,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.254570 kubelet[2102]: E0517 00:56:45.253385 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.255995 kubelet[2102]: E0517 00:56:45.255957 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-ws46h" May 17 00:56:45.258546 kubelet[2102]: E0517 00:56:45.258009 2102 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-ws46h" May 17 00:56:45.258546 kubelet[2102]: E0517 00:56:45.258054 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-8f77d7b6c-ws46h_calico-system(aa6e114e-decb-446a-8bda-8dbdb7e8f8a5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-8f77d7b6c-ws46h_calico-system(aa6e114e-decb-446a-8bda-8dbdb7e8f8a5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 00:56:45.259679 kubelet[2102]: E0517 00:56:45.259578 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.259679 kubelet[2102]: E0517 00:56:45.259617 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-68867d4df7-67kdl" May 17 00:56:45.259679 kubelet[2102]: E0517 00:56:45.259629 2102 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-68867d4df7-67kdl" May 17 00:56:45.260022 kubelet[2102]: E0517 00:56:45.259655 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-68867d4df7-67kdl_calico-apiserver(9fd78396-3dd9-4786-9847-c14d5b321470)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-68867d4df7-67kdl_calico-apiserver(9fd78396-3dd9-4786-9847-c14d5b321470)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-68867d4df7-67kdl" podUID="9fd78396-3dd9-4786-9847-c14d5b321470" May 17 00:56:45.262899 env[1272]: time="2025-05-17T00:56:45.262856195Z" level=error msg="Failed to destroy network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.263213 env[1272]: time="2025-05-17T00:56:45.263193877Z" level=error msg="encountered an error cleaning up failed sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.263294 env[1272]: time="2025-05-17T00:56:45.263276541Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tvdvr,Uid:0c4e0d50-b866-40a1-83cb-4fa0aee569d4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.263668 kubelet[2102]: E0517 00:56:45.263449 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.263668 kubelet[2102]: E0517 00:56:45.263483 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tvdvr" May 17 00:56:45.263668 kubelet[2102]: E0517 00:56:45.263495 2102 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tvdvr" May 17 00:56:45.263759 kubelet[2102]: E0517 00:56:45.263525 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tvdvr_calico-system(0c4e0d50-b866-40a1-83cb-4fa0aee569d4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tvdvr_calico-system(0c4e0d50-b866-40a1-83cb-4fa0aee569d4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:45.269911 env[1272]: time="2025-05-17T00:56:45.269867569Z" level=error msg="Failed to destroy network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.270205 env[1272]: time="2025-05-17T00:56:45.270187210Z" level=error msg="encountered an error cleaning up failed sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.270283 env[1272]: time="2025-05-17T00:56:45.270266411Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68867d4df7-cxrk5,Uid:b161dca0-0f94-492d-84b9-20d1de419b67,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.270686 kubelet[2102]: E0517 00:56:45.270468 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.270686 kubelet[2102]: E0517 00:56:45.270500 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-68867d4df7-cxrk5" May 17 00:56:45.270686 kubelet[2102]: E0517 00:56:45.270513 2102 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-68867d4df7-cxrk5" May 17 00:56:45.270779 kubelet[2102]: E0517 00:56:45.270541 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-68867d4df7-cxrk5_calico-apiserver(b161dca0-0f94-492d-84b9-20d1de419b67)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-68867d4df7-cxrk5_calico-apiserver(b161dca0-0f94-492d-84b9-20d1de419b67)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-68867d4df7-cxrk5" podUID="b161dca0-0f94-492d-84b9-20d1de419b67" May 17 00:56:45.279249 env[1272]: time="2025-05-17T00:56:45.279212774Z" level=error msg="Failed to destroy network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.279567 env[1272]: time="2025-05-17T00:56:45.279547646Z" level=error msg="encountered an error cleaning up failed sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.279649 env[1272]: time="2025-05-17T00:56:45.279631988Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-59b76bc5b6-mrsfm,Uid:bc383263-3126-428e-9f00-fa7e07ca5fdd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.279875 kubelet[2102]: E0517 00:56:45.279837 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.279928 kubelet[2102]: E0517 00:56:45.279906 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-59b76bc5b6-mrsfm" May 17 00:56:45.279928 kubelet[2102]: E0517 00:56:45.279924 2102 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-59b76bc5b6-mrsfm" May 17 00:56:45.279982 kubelet[2102]: E0517 00:56:45.279953 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-59b76bc5b6-mrsfm_calico-system(bc383263-3126-428e-9f00-fa7e07ca5fdd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-59b76bc5b6-mrsfm_calico-system(bc383263-3126-428e-9f00-fa7e07ca5fdd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-59b76bc5b6-mrsfm" podUID="bc383263-3126-428e-9f00-fa7e07ca5fdd" May 17 00:56:45.329378 env[1272]: time="2025-05-17T00:56:45.329342076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-x7hw7,Uid:df85e1d5-d638-465a-a2ca-52d913410447,Namespace:kube-system,Attempt:0,}" May 17 00:56:45.346862 env[1272]: time="2025-05-17T00:56:45.346837916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5759b4fc68-kk5rr,Uid:a96f418b-1185-4aa2-85fc-983c990d5025,Namespace:calico-system,Attempt:0,}" May 17 00:56:45.352522 env[1272]: time="2025-05-17T00:56:45.352499881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-9pqww,Uid:875b9cdb-b513-48de-839e-dca19733e94b,Namespace:kube-system,Attempt:0,}" May 17 00:56:45.371858 env[1272]: time="2025-05-17T00:56:45.371823125Z" level=error msg="Failed to destroy network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.372202 env[1272]: time="2025-05-17T00:56:45.372182025Z" level=error msg="encountered an error cleaning up failed sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.372278 env[1272]: time="2025-05-17T00:56:45.372261629Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-x7hw7,Uid:df85e1d5-d638-465a-a2ca-52d913410447,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.372495 kubelet[2102]: E0517 00:56:45.372432 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.372495 kubelet[2102]: E0517 00:56:45.372467 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-x7hw7" May 17 00:56:45.372741 kubelet[2102]: E0517 00:56:45.372479 2102 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-x7hw7" May 17 00:56:45.372741 kubelet[2102]: E0517 00:56:45.372594 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-x7hw7_kube-system(df85e1d5-d638-465a-a2ca-52d913410447)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-x7hw7_kube-system(df85e1d5-d638-465a-a2ca-52d913410447)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-x7hw7" podUID="df85e1d5-d638-465a-a2ca-52d913410447" May 17 00:56:45.405624 env[1272]: time="2025-05-17T00:56:45.405586316Z" level=error msg="Failed to destroy network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.405839 env[1272]: time="2025-05-17T00:56:45.405818198Z" level=error msg="encountered an error cleaning up failed sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.405876 env[1272]: time="2025-05-17T00:56:45.405856204Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5759b4fc68-kk5rr,Uid:a96f418b-1185-4aa2-85fc-983c990d5025,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.406247 kubelet[2102]: E0517 00:56:45.406029 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.406247 kubelet[2102]: E0517 00:56:45.406066 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5759b4fc68-kk5rr" May 17 00:56:45.406247 kubelet[2102]: E0517 00:56:45.406080 2102 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5759b4fc68-kk5rr" May 17 00:56:45.406702 kubelet[2102]: E0517 00:56:45.406106 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5759b4fc68-kk5rr_calico-system(a96f418b-1185-4aa2-85fc-983c990d5025)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5759b4fc68-kk5rr_calico-system(a96f418b-1185-4aa2-85fc-983c990d5025)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5759b4fc68-kk5rr" podUID="a96f418b-1185-4aa2-85fc-983c990d5025" May 17 00:56:45.420737 env[1272]: time="2025-05-17T00:56:45.420704511Z" level=error msg="Failed to destroy network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.421099 env[1272]: time="2025-05-17T00:56:45.421074846Z" level=error msg="encountered an error cleaning up failed sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.421198 env[1272]: time="2025-05-17T00:56:45.421181247Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-9pqww,Uid:875b9cdb-b513-48de-839e-dca19733e94b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.421614 kubelet[2102]: E0517 00:56:45.421378 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.421614 kubelet[2102]: E0517 00:56:45.421412 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-9pqww" May 17 00:56:45.421614 kubelet[2102]: E0517 00:56:45.421423 2102 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-9pqww" May 17 00:56:45.421727 kubelet[2102]: E0517 00:56:45.421452 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-9pqww_kube-system(875b9cdb-b513-48de-839e-dca19733e94b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-9pqww_kube-system(875b9cdb-b513-48de-839e-dca19733e94b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-9pqww" podUID="875b9cdb-b513-48de-839e-dca19733e94b" May 17 00:56:45.632631 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab-shm.mount: Deactivated successfully. May 17 00:56:45.900562 kubelet[2102]: I0517 00:56:45.900278 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 00:56:45.902876 kubelet[2102]: I0517 00:56:45.902834 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:56:45.912452 kubelet[2102]: I0517 00:56:45.912431 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:56:45.914868 kubelet[2102]: I0517 00:56:45.914850 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 00:56:45.916734 kubelet[2102]: I0517 00:56:45.916718 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:56:45.917651 env[1272]: time="2025-05-17T00:56:45.917502049Z" level=info msg="StopPodSandbox for \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\"" May 17 00:56:45.917837 env[1272]: time="2025-05-17T00:56:45.917762875Z" level=info msg="StopPodSandbox for \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\"" May 17 00:56:45.918067 env[1272]: time="2025-05-17T00:56:45.918021976Z" level=info msg="StopPodSandbox for \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\"" May 17 00:56:45.918256 env[1272]: time="2025-05-17T00:56:45.918230985Z" level=info msg="StopPodSandbox for \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\"" May 17 00:56:45.918417 env[1272]: time="2025-05-17T00:56:45.918392662Z" level=info msg="StopPodSandbox for \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\"" May 17 00:56:45.920448 kubelet[2102]: I0517 00:56:45.920430 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 00:56:45.920815 env[1272]: time="2025-05-17T00:56:45.920787257Z" level=info msg="StopPodSandbox for \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\"" May 17 00:56:45.923677 kubelet[2102]: I0517 00:56:45.923658 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:56:45.924686 env[1272]: time="2025-05-17T00:56:45.924038116Z" level=info msg="StopPodSandbox for \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\"" May 17 00:56:45.924765 kubelet[2102]: I0517 00:56:45.924727 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:56:45.925000 env[1272]: time="2025-05-17T00:56:45.924981365Z" level=info msg="StopPodSandbox for \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\"" May 17 00:56:45.966005 env[1272]: time="2025-05-17T00:56:45.965964083Z" level=error msg="StopPodSandbox for \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\" failed" error="failed to destroy network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.967790 kubelet[2102]: E0517 00:56:45.967758 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:56:45.967861 kubelet[2102]: E0517 00:56:45.967807 2102 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e"} May 17 00:56:45.967861 kubelet[2102]: E0517 00:56:45.967847 2102 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"875b9cdb-b513-48de-839e-dca19733e94b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:56:45.967948 kubelet[2102]: E0517 00:56:45.967862 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"875b9cdb-b513-48de-839e-dca19733e94b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-9pqww" podUID="875b9cdb-b513-48de-839e-dca19733e94b" May 17 00:56:45.979699 env[1272]: time="2025-05-17T00:56:45.979660055Z" level=error msg="StopPodSandbox for \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\" failed" error="failed to destroy network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.979861 kubelet[2102]: E0517 00:56:45.979827 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 00:56:45.979914 kubelet[2102]: E0517 00:56:45.979869 2102 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49"} May 17 00:56:45.979914 kubelet[2102]: E0517 00:56:45.979908 2102 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a96f418b-1185-4aa2-85fc-983c990d5025\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:56:45.979989 kubelet[2102]: E0517 00:56:45.979925 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a96f418b-1185-4aa2-85fc-983c990d5025\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5759b4fc68-kk5rr" podUID="a96f418b-1185-4aa2-85fc-983c990d5025" May 17 00:56:45.998153 env[1272]: time="2025-05-17T00:56:45.998112952Z" level=error msg="StopPodSandbox for \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\" failed" error="failed to destroy network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:45.998322 kubelet[2102]: E0517 00:56:45.998280 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:56:45.998389 kubelet[2102]: E0517 00:56:45.998330 2102 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9"} May 17 00:56:45.998389 kubelet[2102]: E0517 00:56:45.998351 2102 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bc383263-3126-428e-9f00-fa7e07ca5fdd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:56:45.998389 kubelet[2102]: E0517 00:56:45.998373 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bc383263-3126-428e-9f00-fa7e07ca5fdd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-59b76bc5b6-mrsfm" podUID="bc383263-3126-428e-9f00-fa7e07ca5fdd" May 17 00:56:46.004235 env[1272]: time="2025-05-17T00:56:46.004196334Z" level=error msg="StopPodSandbox for \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\" failed" error="failed to destroy network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:46.004499 kubelet[2102]: E0517 00:56:46.004466 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 00:56:46.004554 kubelet[2102]: E0517 00:56:46.004505 2102 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab"} May 17 00:56:46.004554 kubelet[2102]: E0517 00:56:46.004531 2102 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0c4e0d50-b866-40a1-83cb-4fa0aee569d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:56:46.004695 kubelet[2102]: E0517 00:56:46.004546 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0c4e0d50-b866-40a1-83cb-4fa0aee569d4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tvdvr" podUID="0c4e0d50-b866-40a1-83cb-4fa0aee569d4" May 17 00:56:46.005450 env[1272]: time="2025-05-17T00:56:46.005418179Z" level=error msg="StopPodSandbox for \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\" failed" error="failed to destroy network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:46.005537 kubelet[2102]: E0517 00:56:46.005519 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:56:46.005574 kubelet[2102]: E0517 00:56:46.005539 2102 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f"} May 17 00:56:46.005574 kubelet[2102]: E0517 00:56:46.005565 2102 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:56:46.005631 kubelet[2102]: E0517 00:56:46.005578 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 00:56:46.007926 env[1272]: time="2025-05-17T00:56:46.007900697Z" level=error msg="StopPodSandbox for \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\" failed" error="failed to destroy network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:46.008021 kubelet[2102]: E0517 00:56:46.008002 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 00:56:46.008059 kubelet[2102]: E0517 00:56:46.008025 2102 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1"} May 17 00:56:46.008083 kubelet[2102]: E0517 00:56:46.008054 2102 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9fd78396-3dd9-4786-9847-c14d5b321470\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:56:46.008083 kubelet[2102]: E0517 00:56:46.008073 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9fd78396-3dd9-4786-9847-c14d5b321470\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-68867d4df7-67kdl" podUID="9fd78396-3dd9-4786-9847-c14d5b321470" May 17 00:56:46.009565 env[1272]: time="2025-05-17T00:56:46.009540198Z" level=error msg="StopPodSandbox for \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\" failed" error="failed to destroy network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:46.009659 kubelet[2102]: E0517 00:56:46.009640 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:56:46.009697 kubelet[2102]: E0517 00:56:46.009661 2102 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a"} May 17 00:56:46.009718 kubelet[2102]: E0517 00:56:46.009689 2102 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b161dca0-0f94-492d-84b9-20d1de419b67\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:56:46.009718 kubelet[2102]: E0517 00:56:46.009710 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b161dca0-0f94-492d-84b9-20d1de419b67\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-68867d4df7-cxrk5" podUID="b161dca0-0f94-492d-84b9-20d1de419b67" May 17 00:56:46.018473 env[1272]: time="2025-05-17T00:56:46.018432876Z" level=error msg="StopPodSandbox for \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\" failed" error="failed to destroy network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:56:46.018627 kubelet[2102]: E0517 00:56:46.018592 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:56:46.018664 kubelet[2102]: E0517 00:56:46.018637 2102 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015"} May 17 00:56:46.018687 kubelet[2102]: E0517 00:56:46.018664 2102 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"df85e1d5-d638-465a-a2ca-52d913410447\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:56:46.019370 kubelet[2102]: E0517 00:56:46.018688 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"df85e1d5-d638-465a-a2ca-52d913410447\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-x7hw7" podUID="df85e1d5-d638-465a-a2ca-52d913410447" May 17 00:56:50.367645 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3215302875.mount: Deactivated successfully. May 17 00:56:50.405054 env[1272]: time="2025-05-17T00:56:50.405019452Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:50.409994 env[1272]: time="2025-05-17T00:56:50.409977356Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:50.411282 env[1272]: time="2025-05-17T00:56:50.411269730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:50.412397 env[1272]: time="2025-05-17T00:56:50.412383987Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:56:50.412582 env[1272]: time="2025-05-17T00:56:50.412564495Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:56:50.440705 env[1272]: time="2025-05-17T00:56:50.440682748Z" level=info msg="CreateContainer within sandbox \"65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:56:50.449586 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount493549455.mount: Deactivated successfully. May 17 00:56:50.451975 env[1272]: time="2025-05-17T00:56:50.451953413Z" level=info msg="CreateContainer within sandbox \"65b0371b819474313c85b687cfea873503a3ff80f07a8cc64f06c40b3f40d32e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ff9096cb719433a1e4c32892f390c6cb1fd0e5915a4af5c1e291b92131288e19\"" May 17 00:56:50.455299 env[1272]: time="2025-05-17T00:56:50.455284489Z" level=info msg="StartContainer for \"ff9096cb719433a1e4c32892f390c6cb1fd0e5915a4af5c1e291b92131288e19\"" May 17 00:56:50.466556 systemd[1]: Started cri-containerd-ff9096cb719433a1e4c32892f390c6cb1fd0e5915a4af5c1e291b92131288e19.scope. May 17 00:56:50.494574 kernel: audit: type=1400 audit(1747443410.487:980): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.503041 kernel: audit: type=1300 audit(1747443410.487:980): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9314235468 items=0 ppid=2534 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:50.503082 kernel: audit: type=1327 audit(1747443410.487:980): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666393039366362373139343333613165346333323839326633393063 May 17 00:56:50.505808 kernel: audit: type=1400 audit(1747443410.487:981): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.505831 kernel: audit: type=1400 audit(1747443410.487:981): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.505849 kernel: audit: type=1400 audit(1747443410.487:981): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.514842 kernel: audit: type=1400 audit(1747443410.487:981): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.514897 kernel: audit: type=1400 audit(1747443410.487:981): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.514920 kernel: audit: type=1400 audit(1747443410.487:981): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9314235468 items=0 ppid=2534 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:50.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666393039366362373139343333613165346333323839326633393063 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.518913 kernel: audit: type=1400 audit(1747443410.487:981): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.487000 audit: BPF prog-id=139 op=LOAD May 17 00:56:50.487000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003cc658 items=0 ppid=2534 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:50.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666393039366362373139343333613165346333323839326633393063 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit: BPF prog-id=140 op=LOAD May 17 00:56:50.493000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003cc6a8 items=0 ppid=2534 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:50.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666393039366362373139343333613165346333323839326633393063 May 17 00:56:50.493000 audit: BPF prog-id=140 op=UNLOAD May 17 00:56:50.493000 audit: BPF prog-id=139 op=UNLOAD May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:50.493000 audit: BPF prog-id=141 op=LOAD May 17 00:56:50.493000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003cc738 items=0 ppid=2534 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:50.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666393039366362373139343333613165346333323839326633393063 May 17 00:56:50.522692 env[1272]: time="2025-05-17T00:56:50.522667695Z" level=info msg="StartContainer for \"ff9096cb719433a1e4c32892f390c6cb1fd0e5915a4af5c1e291b92131288e19\" returns successfully" May 17 00:56:50.957659 kubelet[2102]: I0517 00:56:50.957622 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-tjwm9" podStartSLOduration=1.438042702 podStartE2EDuration="22.956865448s" podCreationTimestamp="2025-05-17 00:56:28 +0000 UTC" firstStartedPulling="2025-05-17 00:56:28.894327381 +0000 UTC m=+16.295161828" lastFinishedPulling="2025-05-17 00:56:50.413150124 +0000 UTC m=+37.813984574" observedRunningTime="2025-05-17 00:56:50.956542257 +0000 UTC m=+38.357376714" watchObservedRunningTime="2025-05-17 00:56:50.956865448 +0000 UTC m=+38.357699901" May 17 00:56:51.280692 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:56:51.280790 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:56:51.514798 env[1272]: time="2025-05-17T00:56:51.514745912Z" level=info msg="StopPodSandbox for \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\"" May 17 00:56:51.935461 kubelet[2102]: I0517 00:56:51.935413 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.601 [INFO][3289] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.601 [INFO][3289] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" iface="eth0" netns="/var/run/netns/cni-252d1976-10a0-f6f6-81e3-883400a4ce75" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.601 [INFO][3289] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" iface="eth0" netns="/var/run/netns/cni-252d1976-10a0-f6f6-81e3-883400a4ce75" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.602 [INFO][3289] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" iface="eth0" netns="/var/run/netns/cni-252d1976-10a0-f6f6-81e3-883400a4ce75" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.602 [INFO][3289] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.602 [INFO][3289] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.980 [INFO][3298] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.983 [INFO][3298] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:51.983 [INFO][3298] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:52.005 [WARNING][3298] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:52.005 [INFO][3298] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:52.006 [INFO][3298] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:52.009797 env[1272]: 2025-05-17 00:56:52.008 [INFO][3289] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:56:52.011768 systemd[1]: run-netns-cni\x2d252d1976\x2d10a0\x2df6f6\x2d81e3\x2d883400a4ce75.mount: Deactivated successfully. May 17 00:56:52.012973 env[1272]: time="2025-05-17T00:56:52.012218968Z" level=info msg="TearDown network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\" successfully" May 17 00:56:52.012973 env[1272]: time="2025-05-17T00:56:52.012243238Z" level=info msg="StopPodSandbox for \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\" returns successfully" May 17 00:56:52.155194 kubelet[2102]: I0517 00:56:52.155146 2102 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/bc383263-3126-428e-9f00-fa7e07ca5fdd-whisker-backend-key-pair\") pod \"bc383263-3126-428e-9f00-fa7e07ca5fdd\" (UID: \"bc383263-3126-428e-9f00-fa7e07ca5fdd\") " May 17 00:56:52.163406 kubelet[2102]: I0517 00:56:52.163377 2102 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bc383263-3126-428e-9f00-fa7e07ca5fdd-whisker-ca-bundle\") pod \"bc383263-3126-428e-9f00-fa7e07ca5fdd\" (UID: \"bc383263-3126-428e-9f00-fa7e07ca5fdd\") " May 17 00:56:52.163518 kubelet[2102]: I0517 00:56:52.163417 2102 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-rcnxx\" (UniqueName: \"kubernetes.io/projected/bc383263-3126-428e-9f00-fa7e07ca5fdd-kube-api-access-rcnxx\") pod \"bc383263-3126-428e-9f00-fa7e07ca5fdd\" (UID: \"bc383263-3126-428e-9f00-fa7e07ca5fdd\") " May 17 00:56:52.177109 systemd[1]: var-lib-kubelet-pods-bc383263\x2d3126\x2d428e\x2d9f00\x2dfa7e07ca5fdd-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:56:52.179595 systemd[1]: var-lib-kubelet-pods-bc383263\x2d3126\x2d428e\x2d9f00\x2dfa7e07ca5fdd-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2drcnxx.mount: Deactivated successfully. May 17 00:56:52.186030 kubelet[2102]: I0517 00:56:52.183017 2102 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/bc383263-3126-428e-9f00-fa7e07ca5fdd-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "bc383263-3126-428e-9f00-fa7e07ca5fdd" (UID: "bc383263-3126-428e-9f00-fa7e07ca5fdd"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" May 17 00:56:52.186190 kubelet[2102]: I0517 00:56:52.183061 2102 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/bc383263-3126-428e-9f00-fa7e07ca5fdd-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "bc383263-3126-428e-9f00-fa7e07ca5fdd" (UID: "bc383263-3126-428e-9f00-fa7e07ca5fdd"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 17 00:56:52.186250 kubelet[2102]: I0517 00:56:52.185853 2102 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/bc383263-3126-428e-9f00-fa7e07ca5fdd-kube-api-access-rcnxx" (OuterVolumeSpecName: "kube-api-access-rcnxx") pod "bc383263-3126-428e-9f00-fa7e07ca5fdd" (UID: "bc383263-3126-428e-9f00-fa7e07ca5fdd"). InnerVolumeSpecName "kube-api-access-rcnxx". PluginName "kubernetes.io/projected", VolumeGidValue "" May 17 00:56:52.264444 kubelet[2102]: I0517 00:56:52.264403 2102 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/bc383263-3126-428e-9f00-fa7e07ca5fdd-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" May 17 00:56:52.264444 kubelet[2102]: I0517 00:56:52.264434 2102 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bc383263-3126-428e-9f00-fa7e07ca5fdd-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 17 00:56:52.264444 kubelet[2102]: I0517 00:56:52.264440 2102 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-rcnxx\" (UniqueName: \"kubernetes.io/projected/bc383263-3126-428e-9f00-fa7e07ca5fdd-kube-api-access-rcnxx\") on node \"localhost\" DevicePath \"\"" May 17 00:56:52.748000 audit[3367]: AVC avc: denied { write } for pid=3367 comm="tee" name="fd" dev="proc" ino=36727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:56:52.748000 audit[3369]: AVC avc: denied { write } for pid=3369 comm="tee" name="fd" dev="proc" ino=36730 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:56:52.748000 audit[3367]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2bf057e7 a2=241 a3=1b6 items=1 ppid=3331 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:52.748000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:56:52.748000 audit: PATH item=0 name="/dev/fd/63" inode=36713 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:56:52.748000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:56:52.748000 audit[3369]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec2c647e5 a2=241 a3=1b6 items=1 ppid=3326 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:52.748000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:56:52.748000 audit: PATH item=0 name="/dev/fd/63" inode=36714 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:56:52.748000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:56:52.760000 audit[3372]: AVC avc: denied { write } for pid=3372 comm="tee" name="fd" dev="proc" ino=36744 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:56:52.760000 audit[3372]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd68e07d6 a2=241 a3=1b6 items=1 ppid=3332 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:52.760000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:56:52.760000 audit: PATH item=0 name="/dev/fd/63" inode=35632 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:56:52.760000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:56:52.762000 audit[3378]: AVC avc: denied { write } for pid=3378 comm="tee" name="fd" dev="proc" ino=36748 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:56:52.772000 audit[3380]: AVC avc: denied { write } for pid=3380 comm="tee" name="fd" dev="proc" ino=36754 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:56:52.772000 audit[3380]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe09cd27d5 a2=241 a3=1b6 items=1 ppid=3328 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:52.772000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:56:52.772000 audit: PATH item=0 name="/dev/fd/63" inode=35635 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:56:52.772000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:56:52.762000 audit[3378]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe749967e5 a2=241 a3=1b6 items=1 ppid=3337 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:52.762000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:56:52.762000 audit: PATH item=0 name="/dev/fd/63" inode=36737 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:56:52.762000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:56:52.787000 audit[3393]: AVC avc: denied { write } for pid=3393 comm="tee" name="fd" dev="proc" ino=36759 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:56:52.801000 audit[3390]: AVC avc: denied { write } for pid=3390 comm="tee" name="fd" dev="proc" ino=36762 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:56:52.787000 audit[3393]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd9f447e6 a2=241 a3=1b6 items=1 ppid=3339 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:52.787000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:56:52.787000 audit: PATH item=0 name="/dev/fd/63" inode=36751 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:56:52.787000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:56:52.801000 audit[3390]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe61a647e5 a2=241 a3=1b6 items=1 ppid=3333 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:52.801000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:56:52.801000 audit: PATH item=0 name="/dev/fd/63" inode=35638 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:56:52.801000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:56:52.863187 systemd[1]: Removed slice kubepods-besteffort-podbc383263_3126_428e_9f00_fa7e07ca5fdd.slice. May 17 00:56:53.097330 systemd[1]: Created slice kubepods-besteffort-pod818ef22a_f243_4e76_9a56_f361deab60e5.slice. May 17 00:56:53.151000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.151000 audit: BPF prog-id=142 op=LOAD May 17 00:56:53.151000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed0acf380 a2=98 a3=3 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.151000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.151000 audit: BPF prog-id=142 op=UNLOAD May 17 00:56:53.155000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit: BPF prog-id=143 op=LOAD May 17 00:56:53.155000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffed0acf170 a2=94 a3=54428f items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.155000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.155000 audit: BPF prog-id=143 op=UNLOAD May 17 00:56:53.155000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.155000 audit: BPF prog-id=144 op=LOAD May 17 00:56:53.155000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffed0acf1a0 a2=94 a3=2 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.155000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.156000 audit: BPF prog-id=144 op=UNLOAD May 17 00:56:53.237000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit: BPF prog-id=145 op=LOAD May 17 00:56:53.237000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffed0acf060 a2=94 a3=1 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.237000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.237000 audit: BPF prog-id=145 op=UNLOAD May 17 00:56:53.237000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.237000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffed0acf130 a2=50 a3=7ffed0acf210 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.237000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed0acf070 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed0acf0a0 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed0acefb0 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed0acf0c0 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed0acf0a0 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed0acf090 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed0acf0c0 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed0acf0a0 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed0acf0c0 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed0acf090 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffed0acf100 a2=28 a3=0 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffed0aceeb0 a2=50 a3=1 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit: BPF prog-id=146 op=LOAD May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed0aceeb0 a2=94 a3=5 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit: BPF prog-id=146 op=UNLOAD May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffed0acef60 a2=50 a3=1 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffed0acf080 a2=4 a3=38 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.245000 audit[3433]: AVC avc: denied { confidentiality } for pid=3433 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:56:53.245000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffed0acf0d0 a2=94 a3=6 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.245000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.246000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { confidentiality } for pid=3433 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:56:53.246000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffed0ace880 a2=94 a3=88 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.246000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.246000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.246000 audit[3433]: AVC avc: denied { confidentiality } for pid=3433 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:56:53.246000 audit[3433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffed0ace880 a2=94 a3=88 items=0 ppid=3335 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.246000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit: BPF prog-id=147 op=LOAD May 17 00:56:53.256000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b6b21f0 a2=98 a3=1999999999999999 items=0 ppid=3335 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.256000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:56:53.256000 audit: BPF prog-id=147 op=UNLOAD May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit: BPF prog-id=148 op=LOAD May 17 00:56:53.256000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b6b20d0 a2=94 a3=ffff items=0 ppid=3335 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.256000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:56:53.256000 audit: BPF prog-id=148 op=UNLOAD May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.256000 audit: BPF prog-id=149 op=LOAD May 17 00:56:53.256000 audit[3440]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b6b2110 a2=94 a3=7ffe9b6b22f0 items=0 ppid=3335 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.256000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:56:53.256000 audit: BPF prog-id=149 op=UNLOAD May 17 00:56:53.270781 kubelet[2102]: I0517 00:56:53.270744 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dqhvx\" (UniqueName: \"kubernetes.io/projected/818ef22a-f243-4e76-9a56-f361deab60e5-kube-api-access-dqhvx\") pod \"whisker-7978b49988-n5v9k\" (UID: \"818ef22a-f243-4e76-9a56-f361deab60e5\") " pod="calico-system/whisker-7978b49988-n5v9k" May 17 00:56:53.271080 kubelet[2102]: I0517 00:56:53.270796 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/818ef22a-f243-4e76-9a56-f361deab60e5-whisker-backend-key-pair\") pod \"whisker-7978b49988-n5v9k\" (UID: \"818ef22a-f243-4e76-9a56-f361deab60e5\") " pod="calico-system/whisker-7978b49988-n5v9k" May 17 00:56:53.271080 kubelet[2102]: I0517 00:56:53.270815 2102 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/818ef22a-f243-4e76-9a56-f361deab60e5-whisker-ca-bundle\") pod \"whisker-7978b49988-n5v9k\" (UID: \"818ef22a-f243-4e76-9a56-f361deab60e5\") " pod="calico-system/whisker-7978b49988-n5v9k" May 17 00:56:53.325551 systemd-networkd[1064]: vxlan.calico: Link UP May 17 00:56:53.325556 systemd-networkd[1064]: vxlan.calico: Gained carrier May 17 00:56:53.343000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.343000 audit: BPF prog-id=150 op=LOAD May 17 00:56:53.343000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd17071d30 a2=98 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.343000 audit: BPF prog-id=150 op=UNLOAD May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit: BPF prog-id=151 op=LOAD May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd17071b40 a2=94 a3=54428f items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit: BPF prog-id=151 op=UNLOAD May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit: BPF prog-id=152 op=LOAD May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd17071b70 a2=94 a3=2 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit: BPF prog-id=152 op=UNLOAD May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd17071a40 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd17071a70 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd17071980 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd17071a90 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd17071a70 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd17071a60 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd17071a90 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd17071a70 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd17071a90 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd17071a60 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd17071ad0 a2=28 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit: BPF prog-id=153 op=LOAD May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd17071940 a2=94 a3=0 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit: BPF prog-id=153 op=UNLOAD May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd17071930 a2=50 a3=2800 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd17071930 a2=50 a3=2800 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit: BPF prog-id=154 op=LOAD May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd17071150 a2=94 a3=2 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.344000 audit: BPF prog-id=154 op=UNLOAD May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.344000 audit: BPF prog-id=155 op=LOAD May 17 00:56:53.344000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd17071250 a2=94 a3=30 items=0 ppid=3335 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit: BPF prog-id=156 op=LOAD May 17 00:56:53.347000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8f95fed0 a2=98 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.347000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.347000 audit: BPF prog-id=156 op=UNLOAD May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit: BPF prog-id=157 op=LOAD May 17 00:56:53.347000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8f95fcc0 a2=94 a3=54428f items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.347000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.347000 audit: BPF prog-id=157 op=UNLOAD May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.347000 audit: BPF prog-id=158 op=LOAD May 17 00:56:53.347000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8f95fcf0 a2=94 a3=2 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.347000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.347000 audit: BPF prog-id=158 op=UNLOAD May 17 00:56:53.434000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit: BPF prog-id=159 op=LOAD May 17 00:56:53.434000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8f95fbb0 a2=94 a3=1 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.434000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.434000 audit: BPF prog-id=159 op=UNLOAD May 17 00:56:53.434000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.434000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc8f95fc80 a2=50 a3=7ffc8f95fd60 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.434000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8f95fbc0 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8f95fbf0 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8f95fb00 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8f95fc10 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8f95fbf0 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8f95fbe0 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8f95fc10 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8f95fbf0 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8f95fc10 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8f95fbe0 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.441000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.441000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8f95fc50 a2=28 a3=0 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8f95fa00 a2=50 a3=1 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit: BPF prog-id=160 op=LOAD May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8f95fa00 a2=94 a3=5 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit: BPF prog-id=160 op=UNLOAD May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8f95fab0 a2=50 a3=1 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc8f95fbd0 a2=4 a3=38 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { confidentiality } for pid=3468 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8f95fc20 a2=94 a3=6 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { confidentiality } for pid=3468 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8f95f3d0 a2=94 a3=88 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { confidentiality } for pid=3468 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8f95f3d0 a2=94 a3=88 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8f960e00 a2=10 a3=f8f00800 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8f960ca0 a2=10 a3=3 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8f960c40 a2=10 a3=3 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.442000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:53.442000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8f960c40 a2=10 a3=7 items=0 ppid=3335 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:56:53.450000 audit: BPF prog-id=155 op=UNLOAD May 17 00:56:53.574000 audit[3503]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3503 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:53.574000 audit[3503]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd8a7ab0d0 a2=0 a3=7ffd8a7ab0bc items=0 ppid=3335 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.574000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:53.596000 audit[3502]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3502 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:53.596000 audit[3502]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd5e93a480 a2=0 a3=7ffd5e93a46c items=0 ppid=3335 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.596000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:53.612000 audit[3505]: NETFILTER_CFG table=filter:101 family=2 entries=39 op=nft_register_chain pid=3505 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:53.612000 audit[3505]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffed6e1dd40 a2=0 a3=7ffed6e1dd2c items=0 ppid=3335 pid=3505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.612000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:53.613000 audit[3501]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:53.613000 audit[3501]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe98f25610 a2=0 a3=7ffe98f255fc items=0 ppid=3335 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:53.613000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:53.700412 env[1272]: time="2025-05-17T00:56:53.700365556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7978b49988-n5v9k,Uid:818ef22a-f243-4e76-9a56-f361deab60e5,Namespace:calico-system,Attempt:0,}" May 17 00:56:53.905953 systemd-networkd[1064]: cali1e6f3437af2: Link UP May 17 00:56:53.907980 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1e6f3437af2: link becomes ready May 17 00:56:53.911084 systemd-networkd[1064]: cali1e6f3437af2: Gained carrier May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.804 [INFO][3512] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--7978b49988--n5v9k-eth0 whisker-7978b49988- calico-system 818ef22a-f243-4e76-9a56-f361deab60e5 914 0 2025-05-17 00:56:53 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:7978b49988 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-7978b49988-n5v9k eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali1e6f3437af2 [] [] }} ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Namespace="calico-system" Pod="whisker-7978b49988-n5v9k" WorkloadEndpoint="localhost-k8s-whisker--7978b49988--n5v9k-" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.804 [INFO][3512] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Namespace="calico-system" Pod="whisker-7978b49988-n5v9k" WorkloadEndpoint="localhost-k8s-whisker--7978b49988--n5v9k-eth0" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.853 [INFO][3526] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" HandleID="k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Workload="localhost-k8s-whisker--7978b49988--n5v9k-eth0" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.853 [INFO][3526] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" HandleID="k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Workload="localhost-k8s-whisker--7978b49988--n5v9k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9800), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-7978b49988-n5v9k", "timestamp":"2025-05-17 00:56:53.853031215 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.853 [INFO][3526] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.853 [INFO][3526] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.853 [INFO][3526] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.863 [INFO][3526] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.876 [INFO][3526] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.881 [INFO][3526] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.882 [INFO][3526] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.884 [INFO][3526] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.884 [INFO][3526] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.885 [INFO][3526] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970 May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.889 [INFO][3526] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.893 [INFO][3526] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.894 [INFO][3526] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" host="localhost" May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.894 [INFO][3526] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:53.922265 env[1272]: 2025-05-17 00:56:53.894 [INFO][3526] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" HandleID="k8s-pod-network.38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Workload="localhost-k8s-whisker--7978b49988--n5v9k-eth0" May 17 00:56:53.924021 env[1272]: 2025-05-17 00:56:53.896 [INFO][3512] cni-plugin/k8s.go 418: Populated endpoint ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Namespace="calico-system" Pod="whisker-7978b49988-n5v9k" WorkloadEndpoint="localhost-k8s-whisker--7978b49988--n5v9k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--7978b49988--n5v9k-eth0", GenerateName:"whisker-7978b49988-", Namespace:"calico-system", SelfLink:"", UID:"818ef22a-f243-4e76-9a56-f361deab60e5", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7978b49988", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-7978b49988-n5v9k", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali1e6f3437af2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:53.924021 env[1272]: 2025-05-17 00:56:53.897 [INFO][3512] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Namespace="calico-system" Pod="whisker-7978b49988-n5v9k" WorkloadEndpoint="localhost-k8s-whisker--7978b49988--n5v9k-eth0" May 17 00:56:53.924021 env[1272]: 2025-05-17 00:56:53.897 [INFO][3512] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1e6f3437af2 ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Namespace="calico-system" Pod="whisker-7978b49988-n5v9k" WorkloadEndpoint="localhost-k8s-whisker--7978b49988--n5v9k-eth0" May 17 00:56:53.924021 env[1272]: 2025-05-17 00:56:53.909 [INFO][3512] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Namespace="calico-system" Pod="whisker-7978b49988-n5v9k" WorkloadEndpoint="localhost-k8s-whisker--7978b49988--n5v9k-eth0" May 17 00:56:53.924021 env[1272]: 2025-05-17 00:56:53.910 [INFO][3512] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Namespace="calico-system" Pod="whisker-7978b49988-n5v9k" WorkloadEndpoint="localhost-k8s-whisker--7978b49988--n5v9k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--7978b49988--n5v9k-eth0", GenerateName:"whisker-7978b49988-", Namespace:"calico-system", SelfLink:"", UID:"818ef22a-f243-4e76-9a56-f361deab60e5", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7978b49988", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970", Pod:"whisker-7978b49988-n5v9k", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali1e6f3437af2", MAC:"3a:5b:e1:b4:dd:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:53.924021 env[1272]: 2025-05-17 00:56:53.918 [INFO][3512] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970" Namespace="calico-system" Pod="whisker-7978b49988-n5v9k" WorkloadEndpoint="localhost-k8s-whisker--7978b49988--n5v9k-eth0" May 17 00:56:54.024087 env[1272]: time="2025-05-17T00:56:54.023936784Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:54.024087 env[1272]: time="2025-05-17T00:56:54.023972716Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:54.024087 env[1272]: time="2025-05-17T00:56:54.023985178Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:54.006000 audit[3541]: NETFILTER_CFG table=filter:103 family=2 entries=59 op=nft_register_chain pid=3541 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:54.006000 audit[3541]: SYSCALL arch=c000003e syscall=46 success=yes exit=35860 a0=3 a1=7ffc729b4b50 a2=0 a3=7ffc729b4b3c items=0 ppid=3335 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:54.006000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:54.025173 env[1272]: time="2025-05-17T00:56:54.025038242Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970 pid=3555 runtime=io.containerd.runc.v2 May 17 00:56:54.046189 systemd[1]: Started cri-containerd-38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970.scope. May 17 00:56:54.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit: BPF prog-id=161 op=LOAD May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023dc48 a2=10 a3=1c items=0 ppid=3555 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:54.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643162363939343461373131653163383337396366386130613431 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00023d6b0 a2=3c a3=8 items=0 ppid=3555 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:54.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643162363939343461373131653163383337396366386130613431 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit: BPF prog-id=162 op=LOAD May 17 00:56:54.060000 audit[3564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023d9d8 a2=78 a3=c0003d4940 items=0 ppid=3555 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:54.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643162363939343461373131653163383337396366386130613431 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.060000 audit: BPF prog-id=163 op=LOAD May 17 00:56:54.060000 audit[3564]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00023d770 a2=78 a3=c0003d4988 items=0 ppid=3555 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:54.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643162363939343461373131653163383337396366386130613431 May 17 00:56:54.060000 audit: BPF prog-id=163 op=UNLOAD May 17 00:56:54.061000 audit: BPF prog-id=162 op=UNLOAD May 17 00:56:54.061000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { perfmon } for pid=3564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit[3564]: AVC avc: denied { bpf } for pid=3564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:54.061000 audit: BPF prog-id=164 op=LOAD May 17 00:56:54.061000 audit[3564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023dc30 a2=78 a3=c0003d4d98 items=0 ppid=3555 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:54.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643162363939343461373131653163383337396366386130613431 May 17 00:56:54.063729 systemd-resolved[1207]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:56:54.090591 env[1272]: time="2025-05-17T00:56:54.090542007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7978b49988-n5v9k,Uid:818ef22a-f243-4e76-9a56-f361deab60e5,Namespace:calico-system,Attempt:0,} returns sandbox id \"38d1b69944a711e1c8379cf8a0a418ed0f021548c3d40a46becf6c9b1a78d970\"" May 17 00:56:54.096278 env[1272]: time="2025-05-17T00:56:54.096218986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:56:54.360354 env[1272]: time="2025-05-17T00:56:54.360292951Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:56:54.366186 env[1272]: time="2025-05-17T00:56:54.366117804Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:56:54.380788 kubelet[2102]: E0517 00:56:54.380733 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:56:54.394321 kubelet[2102]: E0517 00:56:54.394289 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:56:54.561171 kubelet[2102]: E0517 00:56:54.561125 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f3220a9cd9124e429d43096f605c6b7f,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-dqhvx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7978b49988-n5v9k_calico-system(818ef22a-f243-4e76-9a56-f361deab60e5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:56:54.562810 env[1272]: time="2025-05-17T00:56:54.562726447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:56:54.790479 env[1272]: time="2025-05-17T00:56:54.790402477Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:56:54.797136 env[1272]: time="2025-05-17T00:56:54.797070906Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:56:54.797380 kubelet[2102]: E0517 00:56:54.797353 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:56:54.797467 kubelet[2102]: E0517 00:56:54.797456 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:56:54.797604 kubelet[2102]: E0517 00:56:54.797576 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-dqhvx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7978b49988-n5v9k_calico-system(818ef22a-f243-4e76-9a56-f361deab60e5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:56:54.807668 kubelet[2102]: E0517 00:56:54.807622 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7978b49988-n5v9k" podUID="818ef22a-f243-4e76-9a56-f361deab60e5" May 17 00:56:54.817116 kubelet[2102]: I0517 00:56:54.817080 2102 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="bc383263-3126-428e-9f00-fa7e07ca5fdd" path="/var/lib/kubelet/pods/bc383263-3126-428e-9f00-fa7e07ca5fdd/volumes" May 17 00:56:54.818055 systemd-networkd[1064]: vxlan.calico: Gained IPv6LL May 17 00:56:54.939190 kubelet[2102]: E0517 00:56:54.939161 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-7978b49988-n5v9k" podUID="818ef22a-f243-4e76-9a56-f361deab60e5" May 17 00:56:55.009201 kubelet[2102]: I0517 00:56:55.009176 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:56:55.387000 audit[3612]: NETFILTER_CFG table=filter:104 family=2 entries=20 op=nft_register_rule pid=3612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:55.387000 audit[3612]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe36283550 a2=0 a3=7ffe3628353c items=0 ppid=2246 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:55.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:55.395000 audit[3612]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:56:55.395000 audit[3612]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe36283550 a2=0 a3=0 items=0 ppid=2246 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:55.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:56:55.714171 systemd-networkd[1064]: cali1e6f3437af2: Gained IPv6LL May 17 00:56:55.940249 kubelet[2102]: E0517 00:56:55.940212 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-7978b49988-n5v9k" podUID="818ef22a-f243-4e76-9a56-f361deab60e5" May 17 00:56:56.817318 env[1272]: time="2025-05-17T00:56:56.817290594Z" level=info msg="StopPodSandbox for \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\"" May 17 00:56:56.817708 env[1272]: time="2025-05-17T00:56:56.817695383Z" level=info msg="StopPodSandbox for \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\"" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:56.959 [INFO][3654] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:56.959 [INFO][3654] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" iface="eth0" netns="/var/run/netns/cni-d0d91f30-38f9-67a1-0ba9-be10eeef62dd" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:56.959 [INFO][3654] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" iface="eth0" netns="/var/run/netns/cni-d0d91f30-38f9-67a1-0ba9-be10eeef62dd" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:56.974 [INFO][3654] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" iface="eth0" netns="/var/run/netns/cni-d0d91f30-38f9-67a1-0ba9-be10eeef62dd" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:56.974 [INFO][3654] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:56.974 [INFO][3654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:57.033 [INFO][3669] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:57.033 [INFO][3669] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:57.033 [INFO][3669] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:57.090 [WARNING][3669] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:57.090 [INFO][3669] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:57.123 [INFO][3669] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:57.135036 env[1272]: 2025-05-17 00:56:57.125 [INFO][3654] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:56:57.144384 env[1272]: time="2025-05-17T00:56:57.140847201Z" level=info msg="TearDown network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\" successfully" May 17 00:56:57.144384 env[1272]: time="2025-05-17T00:56:57.140895129Z" level=info msg="StopPodSandbox for \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\" returns successfully" May 17 00:56:57.139417 systemd[1]: run-netns-cni\x2dd0d91f30\x2d38f9\x2d67a1\x2d0ba9\x2dbe10eeef62dd.mount: Deactivated successfully. May 17 00:56:57.152849 env[1272]: time="2025-05-17T00:56:57.148817795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68867d4df7-cxrk5,Uid:b161dca0-0f94-492d-84b9-20d1de419b67,Namespace:calico-apiserver,Attempt:1,}" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:56.951 [INFO][3653] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:56.951 [INFO][3653] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" iface="eth0" netns="/var/run/netns/cni-2499aecd-9090-de2c-f09c-c67974a0b53e" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:56.951 [INFO][3653] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" iface="eth0" netns="/var/run/netns/cni-2499aecd-9090-de2c-f09c-c67974a0b53e" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:56.952 [INFO][3653] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" iface="eth0" netns="/var/run/netns/cni-2499aecd-9090-de2c-f09c-c67974a0b53e" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:56.952 [INFO][3653] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:56.952 [INFO][3653] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:57.040 [INFO][3667] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:57.040 [INFO][3667] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:57.123 [INFO][3667] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:57.141 [WARNING][3667] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:57.141 [INFO][3667] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:57.172 [INFO][3667] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:57.176971 env[1272]: 2025-05-17 00:56:57.174 [INFO][3653] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 00:56:57.180805 systemd[1]: run-netns-cni\x2d2499aecd\x2d9090\x2dde2c\x2df09c\x2dc67974a0b53e.mount: Deactivated successfully. May 17 00:56:57.181693 env[1272]: time="2025-05-17T00:56:57.181658762Z" level=info msg="TearDown network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\" successfully" May 17 00:56:57.181790 env[1272]: time="2025-05-17T00:56:57.181771310Z" level=info msg="StopPodSandbox for \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\" returns successfully" May 17 00:56:57.182294 env[1272]: time="2025-05-17T00:56:57.182275439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tvdvr,Uid:0c4e0d50-b866-40a1-83cb-4fa0aee569d4,Namespace:calico-system,Attempt:1,}" May 17 00:56:57.345233 systemd-networkd[1064]: cali3fd53c92221: Link UP May 17 00:56:57.348043 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:56:57.348116 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3fd53c92221: link becomes ready May 17 00:56:57.347675 systemd-networkd[1064]: cali3fd53c92221: Gained carrier May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.254 [INFO][3681] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0 calico-apiserver-68867d4df7- calico-apiserver b161dca0-0f94-492d-84b9-20d1de419b67 949 0 2025-05-17 00:56:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:68867d4df7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-68867d4df7-cxrk5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3fd53c92221 [] [] }} ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-cxrk5" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.254 [INFO][3681] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-cxrk5" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.290 [INFO][3704] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" HandleID="k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.290 [INFO][3704] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" HandleID="k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-68867d4df7-cxrk5", "timestamp":"2025-05-17 00:56:57.290585496 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.290 [INFO][3704] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.290 [INFO][3704] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.290 [INFO][3704] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.294 [INFO][3704] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.297 [INFO][3704] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.301 [INFO][3704] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.307 [INFO][3704] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.309 [INFO][3704] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.309 [INFO][3704] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.311 [INFO][3704] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137 May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.324 [INFO][3704] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.333 [INFO][3704] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.333 [INFO][3704] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" host="localhost" May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.333 [INFO][3704] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:57.376892 env[1272]: 2025-05-17 00:56:57.333 [INFO][3704] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" HandleID="k8s-pod-network.8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.391243 env[1272]: 2025-05-17 00:56:57.334 [INFO][3681] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-cxrk5" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0", GenerateName:"calico-apiserver-68867d4df7-", Namespace:"calico-apiserver", SelfLink:"", UID:"b161dca0-0f94-492d-84b9-20d1de419b67", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68867d4df7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-68867d4df7-cxrk5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3fd53c92221", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:57.391243 env[1272]: 2025-05-17 00:56:57.334 [INFO][3681] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-cxrk5" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.391243 env[1272]: 2025-05-17 00:56:57.335 [INFO][3681] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3fd53c92221 ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-cxrk5" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.391243 env[1272]: 2025-05-17 00:56:57.353 [INFO][3681] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-cxrk5" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.391243 env[1272]: 2025-05-17 00:56:57.354 [INFO][3681] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-cxrk5" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0", GenerateName:"calico-apiserver-68867d4df7-", Namespace:"calico-apiserver", SelfLink:"", UID:"b161dca0-0f94-492d-84b9-20d1de419b67", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68867d4df7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137", Pod:"calico-apiserver-68867d4df7-cxrk5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3fd53c92221", MAC:"06:21:15:ce:24:35", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:57.391243 env[1272]: 2025-05-17 00:56:57.375 [INFO][3681] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-cxrk5" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:56:57.398380 env[1272]: time="2025-05-17T00:56:57.398340802Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:57.398522 env[1272]: time="2025-05-17T00:56:57.398505258Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:57.398592 env[1272]: time="2025-05-17T00:56:57.398576616Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:57.398751 env[1272]: time="2025-05-17T00:56:57.398732277Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137 pid=3732 runtime=io.containerd.runc.v2 May 17 00:56:57.411697 systemd[1]: Started cri-containerd-8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137.scope. May 17 00:56:57.426198 kernel: kauditd_printk_skb: 614 callbacks suppressed May 17 00:56:57.426277 kernel: audit: type=1400 audit(1747443417.422:1109): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.431977 kernel: audit: type=1400 audit(1747443417.422:1110): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.432029 kernel: audit: type=1400 audit(1747443417.422:1111): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.434712 kernel: audit: type=1400 audit(1747443417.422:1112): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.439976 kernel: audit: type=1400 audit(1747443417.422:1113): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.440020 kernel: audit: type=1400 audit(1747443417.422:1114): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.437746 systemd-resolved[1207]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:56:57.443258 kernel: audit: type=1400 audit(1747443417.422:1115): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.445889 kernel: audit: type=1400 audit(1747443417.422:1116): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.452903 kernel: audit: type=1400 audit(1747443417.422:1117): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.452949 kernel: audit: type=1400 audit(1747443417.425:1118): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit: BPF prog-id=165 op=LOAD May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3732 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303236363433333530616632393435303431323034356662616164 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3732 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303236363433333530616632393435303431323034356662616164 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit: BPF prog-id=166 op=LOAD May 17 00:56:57.425000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000383e90 items=0 ppid=3732 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303236363433333530616632393435303431323034356662616164 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit: BPF prog-id=167 op=LOAD May 17 00:56:57.425000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000383ed8 items=0 ppid=3732 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303236363433333530616632393435303431323034356662616164 May 17 00:56:57.425000 audit: BPF prog-id=167 op=UNLOAD May 17 00:56:57.425000 audit: BPF prog-id=166 op=UNLOAD May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { perfmon } for pid=3739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit[3739]: AVC avc: denied { bpf } for pid=3739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.425000 audit: BPF prog-id=168 op=LOAD May 17 00:56:57.425000 audit[3739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f82e8 items=0 ppid=3732 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303236363433333530616632393435303431323034356662616164 May 17 00:56:57.470930 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicfb7ea7220e: link becomes ready May 17 00:56:57.471433 systemd-networkd[1064]: calicfb7ea7220e: Link UP May 17 00:56:57.471545 systemd-networkd[1064]: calicfb7ea7220e: Gained carrier May 17 00:56:57.493666 env[1272]: time="2025-05-17T00:56:57.493631844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68867d4df7-cxrk5,Uid:b161dca0-0f94-492d-84b9-20d1de419b67,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137\"" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.254 [INFO][3690] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--tvdvr-eth0 csi-node-driver- calico-system 0c4e0d50-b866-40a1-83cb-4fa0aee569d4 948 0 2025-05-17 00:56:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-tvdvr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calicfb7ea7220e [] [] }} ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Namespace="calico-system" Pod="csi-node-driver-tvdvr" WorkloadEndpoint="localhost-k8s-csi--node--driver--tvdvr-" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.254 [INFO][3690] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Namespace="calico-system" Pod="csi-node-driver-tvdvr" WorkloadEndpoint="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.327 [INFO][3712] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" HandleID="k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.327 [INFO][3712] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" HandleID="k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1020), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-tvdvr", "timestamp":"2025-05-17 00:56:57.32734983 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.327 [INFO][3712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.333 [INFO][3712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.333 [INFO][3712] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.396 [INFO][3712] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.415 [INFO][3712] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.430 [INFO][3712] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.430 [INFO][3712] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.435 [INFO][3712] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.435 [INFO][3712] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.440 [INFO][3712] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5 May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.459 [INFO][3712] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.466 [INFO][3712] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.466 [INFO][3712] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" host="localhost" May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.466 [INFO][3712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:57.494042 env[1272]: 2025-05-17 00:56:57.466 [INFO][3712] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" HandleID="k8s-pod-network.75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.497690 env[1272]: 2025-05-17 00:56:57.467 [INFO][3690] cni-plugin/k8s.go 418: Populated endpoint ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Namespace="calico-system" Pod="csi-node-driver-tvdvr" WorkloadEndpoint="localhost-k8s-csi--node--driver--tvdvr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tvdvr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0c4e0d50-b866-40a1-83cb-4fa0aee569d4", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-tvdvr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicfb7ea7220e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:57.497690 env[1272]: 2025-05-17 00:56:57.467 [INFO][3690] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Namespace="calico-system" Pod="csi-node-driver-tvdvr" WorkloadEndpoint="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.497690 env[1272]: 2025-05-17 00:56:57.468 [INFO][3690] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicfb7ea7220e ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Namespace="calico-system" Pod="csi-node-driver-tvdvr" WorkloadEndpoint="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.497690 env[1272]: 2025-05-17 00:56:57.470 [INFO][3690] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Namespace="calico-system" Pod="csi-node-driver-tvdvr" WorkloadEndpoint="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.497690 env[1272]: 2025-05-17 00:56:57.470 [INFO][3690] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Namespace="calico-system" Pod="csi-node-driver-tvdvr" WorkloadEndpoint="localhost-k8s-csi--node--driver--tvdvr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tvdvr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0c4e0d50-b866-40a1-83cb-4fa0aee569d4", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5", Pod:"csi-node-driver-tvdvr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicfb7ea7220e", MAC:"16:c5:da:88:3d:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:57.497690 env[1272]: 2025-05-17 00:56:57.490 [INFO][3690] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5" Namespace="calico-system" Pod="csi-node-driver-tvdvr" WorkloadEndpoint="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 00:56:57.499403 env[1272]: time="2025-05-17T00:56:57.499375149Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:56:57.532756 env[1272]: time="2025-05-17T00:56:57.532707127Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:57.532855 env[1272]: time="2025-05-17T00:56:57.532738723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:57.532855 env[1272]: time="2025-05-17T00:56:57.532750194Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:57.544054 env[1272]: time="2025-05-17T00:56:57.533078429Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5 pid=3782 runtime=io.containerd.runc.v2 May 17 00:56:57.540470 systemd[1]: Started cri-containerd-75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5.scope. May 17 00:56:57.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit: BPF prog-id=169 op=LOAD May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3782 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333232626533323830656263666332346565326330323939373862 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3782 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333232626533323830656263666332346565326330323939373862 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit: BPF prog-id=170 op=LOAD May 17 00:56:57.552000 audit[3793]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001d0c70 items=0 ppid=3782 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333232626533323830656263666332346565326330323939373862 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit: BPF prog-id=171 op=LOAD May 17 00:56:57.552000 audit[3793]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001d0cb8 items=0 ppid=3782 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333232626533323830656263666332346565326330323939373862 May 17 00:56:57.552000 audit: BPF prog-id=171 op=UNLOAD May 17 00:56:57.552000 audit: BPF prog-id=170 op=UNLOAD May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { perfmon } for pid=3793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit[3793]: AVC avc: denied { bpf } for pid=3793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:57.552000 audit: BPF prog-id=172 op=LOAD May 17 00:56:57.552000 audit[3793]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001d10c8 items=0 ppid=3782 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333232626533323830656263666332346565326330323939373862 May 17 00:56:57.555383 systemd-resolved[1207]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:56:57.562555 env[1272]: time="2025-05-17T00:56:57.562533767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tvdvr,Uid:0c4e0d50-b866-40a1-83cb-4fa0aee569d4,Namespace:calico-system,Attempt:1,} returns sandbox id \"75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5\"" May 17 00:56:57.597000 audit[3817]: NETFILTER_CFG table=filter:106 family=2 entries=50 op=nft_register_chain pid=3817 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:57.597000 audit[3817]: SYSCALL arch=c000003e syscall=46 success=yes exit=28208 a0=3 a1=7ffda83ea0b0 a2=0 a3=7ffda83ea09c items=0 ppid=3335 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.597000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:57.615000 audit[3820]: NETFILTER_CFG table=filter:107 family=2 entries=40 op=nft_register_chain pid=3820 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:57.615000 audit[3820]: SYSCALL arch=c000003e syscall=46 success=yes exit=20764 a0=3 a1=7fff9bd6a1a0 a2=0 a3=7fff9bd6a18c items=0 ppid=3335 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:57.615000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:57.813671 env[1272]: time="2025-05-17T00:56:57.813630435Z" level=info msg="StopPodSandbox for \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\"" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.868 [INFO][3830] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.869 [INFO][3830] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" iface="eth0" netns="/var/run/netns/cni-cea41189-ba37-e78c-d699-968d30ef1886" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.869 [INFO][3830] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" iface="eth0" netns="/var/run/netns/cni-cea41189-ba37-e78c-d699-968d30ef1886" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.869 [INFO][3830] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" iface="eth0" netns="/var/run/netns/cni-cea41189-ba37-e78c-d699-968d30ef1886" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.880 [INFO][3830] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.880 [INFO][3830] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.894 [INFO][3838] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.894 [INFO][3838] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.894 [INFO][3838] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.898 [WARNING][3838] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.901 [INFO][3838] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.902 [INFO][3838] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:57.904531 env[1272]: 2025-05-17 00:56:57.903 [INFO][3830] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 00:56:57.905053 env[1272]: time="2025-05-17T00:56:57.904652518Z" level=info msg="TearDown network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\" successfully" May 17 00:56:57.905053 env[1272]: time="2025-05-17T00:56:57.904672647Z" level=info msg="StopPodSandbox for \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\" returns successfully" May 17 00:56:57.905053 env[1272]: time="2025-05-17T00:56:57.905009201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68867d4df7-67kdl,Uid:9fd78396-3dd9-4786-9847-c14d5b321470,Namespace:calico-apiserver,Attempt:1,}" May 17 00:56:58.114602 systemd-networkd[1064]: cali14f9345cc86: Link UP May 17 00:56:58.117510 systemd-networkd[1064]: cali14f9345cc86: Gained carrier May 17 00:56:58.117979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14f9345cc86: link becomes ready May 17 00:56:58.140789 systemd[1]: run-netns-cni\x2dcea41189\x2dba37\x2de78c\x2dd699\x2d968d30ef1886.mount: Deactivated successfully. May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:57.983 [INFO][3844] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0 calico-apiserver-68867d4df7- calico-apiserver 9fd78396-3dd9-4786-9847-c14d5b321470 960 0 2025-05-17 00:56:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:68867d4df7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-68867d4df7-67kdl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali14f9345cc86 [] [] }} ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-67kdl" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--67kdl-" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:57.983 [INFO][3844] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-67kdl" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.003 [INFO][3857] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" HandleID="k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.003 [INFO][3857] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" HandleID="k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d3020), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-68867d4df7-67kdl", "timestamp":"2025-05-17 00:56:58.003103841 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.003 [INFO][3857] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.003 [INFO][3857] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.003 [INFO][3857] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.028 [INFO][3857] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.031 [INFO][3857] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.034 [INFO][3857] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.035 [INFO][3857] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.037 [INFO][3857] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.037 [INFO][3857] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.038 [INFO][3857] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72 May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.047 [INFO][3857] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.110 [INFO][3857] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.110 [INFO][3857] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" host="localhost" May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.110 [INFO][3857] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:58.158532 env[1272]: 2025-05-17 00:56:58.110 [INFO][3857] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" HandleID="k8s-pod-network.b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:58.159133 env[1272]: 2025-05-17 00:56:58.112 [INFO][3844] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-67kdl" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0", GenerateName:"calico-apiserver-68867d4df7-", Namespace:"calico-apiserver", SelfLink:"", UID:"9fd78396-3dd9-4786-9847-c14d5b321470", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68867d4df7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-68867d4df7-67kdl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14f9345cc86", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:58.159133 env[1272]: 2025-05-17 00:56:58.112 [INFO][3844] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-67kdl" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:58.159133 env[1272]: 2025-05-17 00:56:58.112 [INFO][3844] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali14f9345cc86 ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-67kdl" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:58.159133 env[1272]: 2025-05-17 00:56:58.118 [INFO][3844] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-67kdl" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:58.159133 env[1272]: 2025-05-17 00:56:58.118 [INFO][3844] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-67kdl" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0", GenerateName:"calico-apiserver-68867d4df7-", Namespace:"calico-apiserver", SelfLink:"", UID:"9fd78396-3dd9-4786-9847-c14d5b321470", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68867d4df7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72", Pod:"calico-apiserver-68867d4df7-67kdl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14f9345cc86", MAC:"26:a9:0e:a7:a4:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:58.159133 env[1272]: 2025-05-17 00:56:58.156 [INFO][3844] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72" Namespace="calico-apiserver" Pod="calico-apiserver-68867d4df7-67kdl" WorkloadEndpoint="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 00:56:58.167388 env[1272]: time="2025-05-17T00:56:58.167339274Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:58.167519 env[1272]: time="2025-05-17T00:56:58.167368326Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:58.167519 env[1272]: time="2025-05-17T00:56:58.167376812Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:58.167657 env[1272]: time="2025-05-17T00:56:58.167635964Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72 pid=3880 runtime=io.containerd.runc.v2 May 17 00:56:58.172000 audit[3886]: NETFILTER_CFG table=filter:108 family=2 entries=51 op=nft_register_chain pid=3886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:58.172000 audit[3886]: SYSCALL arch=c000003e syscall=46 success=yes exit=27116 a0=3 a1=7ffd1f5ac250 a2=0 a3=7ffd1f5ac23c items=0 ppid=3335 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:58.172000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:58.180053 systemd[1]: Started cri-containerd-b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72.scope. May 17 00:56:58.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit: BPF prog-id=173 op=LOAD May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3880 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:58.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363866663737636332623334646361373738383265363063353732 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3880 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:58.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363866663737636332623334646361373738383265363063353732 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit: BPF prog-id=174 op=LOAD May 17 00:56:58.198000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039b620 items=0 ppid=3880 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:58.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363866663737636332623334646361373738383265363063353732 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit: BPF prog-id=175 op=LOAD May 17 00:56:58.198000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039b668 items=0 ppid=3880 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:58.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363866663737636332623334646361373738383265363063353732 May 17 00:56:58.198000 audit: BPF prog-id=175 op=UNLOAD May 17 00:56:58.198000 audit: BPF prog-id=174 op=UNLOAD May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:58.198000 audit: BPF prog-id=176 op=LOAD May 17 00:56:58.198000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039ba78 items=0 ppid=3880 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:58.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363866663737636332623334646361373738383265363063353732 May 17 00:56:58.201529 systemd-resolved[1207]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:56:58.229009 env[1272]: time="2025-05-17T00:56:58.228979082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68867d4df7-67kdl,Uid:9fd78396-3dd9-4786-9847-c14d5b321470,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72\"" May 17 00:56:58.786013 systemd-networkd[1064]: cali3fd53c92221: Gained IPv6LL May 17 00:56:58.813134 env[1272]: time="2025-05-17T00:56:58.813109783Z" level=info msg="StopPodSandbox for \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\"" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.874 [INFO][3930] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.875 [INFO][3930] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" iface="eth0" netns="/var/run/netns/cni-3bda56f4-fc6f-4da9-3dde-2cc26706e8b1" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.875 [INFO][3930] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" iface="eth0" netns="/var/run/netns/cni-3bda56f4-fc6f-4da9-3dde-2cc26706e8b1" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.875 [INFO][3930] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" iface="eth0" netns="/var/run/netns/cni-3bda56f4-fc6f-4da9-3dde-2cc26706e8b1" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.875 [INFO][3930] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.875 [INFO][3930] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.896 [INFO][3937] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.896 [INFO][3937] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.896 [INFO][3937] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.900 [WARNING][3937] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.900 [INFO][3937] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.901 [INFO][3937] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:58.904026 env[1272]: 2025-05-17 00:56:58.902 [INFO][3930] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:56:58.910972 env[1272]: time="2025-05-17T00:56:58.906518969Z" level=info msg="TearDown network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\" successfully" May 17 00:56:58.910972 env[1272]: time="2025-05-17T00:56:58.906544909Z" level=info msg="StopPodSandbox for \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\" returns successfully" May 17 00:56:58.910972 env[1272]: time="2025-05-17T00:56:58.906995311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-x7hw7,Uid:df85e1d5-d638-465a-a2ca-52d913410447,Namespace:kube-system,Attempt:1,}" May 17 00:56:58.906036 systemd[1]: run-netns-cni\x2d3bda56f4\x2dfc6f\x2d4da9\x2d3dde\x2d2cc26706e8b1.mount: Deactivated successfully. May 17 00:56:59.021896 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:56:59.021964 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0460272fc49: link becomes ready May 17 00:56:59.021962 systemd-networkd[1064]: cali0460272fc49: Link UP May 17 00:56:59.022080 systemd-networkd[1064]: cali0460272fc49: Gained carrier May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.955 [INFO][3944] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0 coredns-7c65d6cfc9- kube-system df85e1d5-d638-465a-a2ca-52d913410447 970 0 2025-05-17 00:56:17 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7c65d6cfc9-x7hw7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0460272fc49 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Namespace="kube-system" Pod="coredns-7c65d6cfc9-x7hw7" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--x7hw7-" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.955 [INFO][3944] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Namespace="kube-system" Pod="coredns-7c65d6cfc9-x7hw7" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.982 [INFO][3955] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" HandleID="k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.982 [INFO][3955] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" HandleID="k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9050), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7c65d6cfc9-x7hw7", "timestamp":"2025-05-17 00:56:58.982814961 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.982 [INFO][3955] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.982 [INFO][3955] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.983 [INFO][3955] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.988 [INFO][3955] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.990 [INFO][3955] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.992 [INFO][3955] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.993 [INFO][3955] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.995 [INFO][3955] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.995 [INFO][3955] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.996 [INFO][3955] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042 May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:58.998 [INFO][3955] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:59.017 [INFO][3955] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:59.017 [INFO][3955] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" host="localhost" May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:59.017 [INFO][3955] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:56:59.048463 env[1272]: 2025-05-17 00:56:59.017 [INFO][3955] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" HandleID="k8s-pod-network.f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:59.050315 env[1272]: 2025-05-17 00:56:59.018 [INFO][3944] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Namespace="kube-system" Pod="coredns-7c65d6cfc9-x7hw7" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"df85e1d5-d638-465a-a2ca-52d913410447", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7c65d6cfc9-x7hw7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0460272fc49", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:59.050315 env[1272]: 2025-05-17 00:56:59.018 [INFO][3944] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Namespace="kube-system" Pod="coredns-7c65d6cfc9-x7hw7" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:59.050315 env[1272]: 2025-05-17 00:56:59.018 [INFO][3944] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0460272fc49 ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Namespace="kube-system" Pod="coredns-7c65d6cfc9-x7hw7" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:59.050315 env[1272]: 2025-05-17 00:56:59.022 [INFO][3944] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Namespace="kube-system" Pod="coredns-7c65d6cfc9-x7hw7" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:59.050315 env[1272]: 2025-05-17 00:56:59.024 [INFO][3944] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Namespace="kube-system" Pod="coredns-7c65d6cfc9-x7hw7" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"df85e1d5-d638-465a-a2ca-52d913410447", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042", Pod:"coredns-7c65d6cfc9-x7hw7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0460272fc49", MAC:"d6:6f:3c:62:87:4d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:56:59.050315 env[1272]: 2025-05-17 00:56:59.043 [INFO][3944] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042" Namespace="kube-system" Pod="coredns-7c65d6cfc9-x7hw7" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:56:59.073587 env[1272]: time="2025-05-17T00:56:59.073528485Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:56:59.073587 env[1272]: time="2025-05-17T00:56:59.073563997Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:56:59.073790 env[1272]: time="2025-05-17T00:56:59.073580135Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:56:59.075060 env[1272]: time="2025-05-17T00:56:59.073940755Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042 pid=3978 runtime=io.containerd.runc.v2 May 17 00:56:59.089646 systemd[1]: Started cri-containerd-f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042.scope. May 17 00:56:59.086000 audit[3996]: NETFILTER_CFG table=filter:109 family=2 entries=50 op=nft_register_chain pid=3996 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:56:59.086000 audit[3996]: SYSCALL arch=c000003e syscall=46 success=yes exit=24912 a0=3 a1=7ffe01352bc0 a2=0 a3=7ffe01352bac items=0 ppid=3335 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.086000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:56:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit: BPF prog-id=177 op=LOAD May 17 00:56:59.103000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386466376163316264343033616265366433326263353334323034 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386466376163316264343033616265366433326263353334323034 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.103000 audit: BPF prog-id=178 op=LOAD May 17 00:56:59.103000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000221c20 items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386466376163316264343033616265366433326263353334323034 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit: BPF prog-id=179 op=LOAD May 17 00:56:59.104000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000221c68 items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386466376163316264343033616265366433326263353334323034 May 17 00:56:59.104000 audit: BPF prog-id=179 op=UNLOAD May 17 00:56:59.104000 audit: BPF prog-id=178 op=UNLOAD May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.104000 audit: BPF prog-id=180 op=LOAD May 17 00:56:59.104000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00027e078 items=0 ppid=3978 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386466376163316264343033616265366433326263353334323034 May 17 00:56:59.106410 systemd-resolved[1207]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:56:59.138214 env[1272]: time="2025-05-17T00:56:59.138190868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-x7hw7,Uid:df85e1d5-d638-465a-a2ca-52d913410447,Namespace:kube-system,Attempt:1,} returns sandbox id \"f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042\"" May 17 00:56:59.189320 env[1272]: time="2025-05-17T00:56:59.189291090Z" level=info msg="CreateContainer within sandbox \"f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:56:59.210410 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2927206327.mount: Deactivated successfully. May 17 00:56:59.216364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1351799118.mount: Deactivated successfully. May 17 00:56:59.219017 env[1272]: time="2025-05-17T00:56:59.218974596Z" level=info msg="CreateContainer within sandbox \"f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c2847eac658b45cbe0620da811b5719e3c11c9b4ce773664a4e253f4cb0f4193\"" May 17 00:56:59.219475 env[1272]: time="2025-05-17T00:56:59.219430808Z" level=info msg="StartContainer for \"c2847eac658b45cbe0620da811b5719e3c11c9b4ce773664a4e253f4cb0f4193\"" May 17 00:56:59.231668 systemd[1]: Started cri-containerd-c2847eac658b45cbe0620da811b5719e3c11c9b4ce773664a4e253f4cb0f4193.scope. May 17 00:56:59.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.375000 audit: BPF prog-id=181 op=LOAD May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3978 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383437656163363538623435636265303632306461383131623537 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3978 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383437656163363538623435636265303632306461383131623537 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit: BPF prog-id=182 op=LOAD May 17 00:56:59.376000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000216880 items=0 ppid=3978 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383437656163363538623435636265303632306461383131623537 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit: BPF prog-id=183 op=LOAD May 17 00:56:59.376000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002168c8 items=0 ppid=3978 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383437656163363538623435636265303632306461383131623537 May 17 00:56:59.376000 audit: BPF prog-id=183 op=UNLOAD May 17 00:56:59.376000 audit: BPF prog-id=182 op=UNLOAD May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:56:59.376000 audit: BPF prog-id=184 op=LOAD May 17 00:56:59.376000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000216cd8 items=0 ppid=3978 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:56:59.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383437656163363538623435636265303632306461383131623537 May 17 00:56:59.424423 env[1272]: time="2025-05-17T00:56:59.424385567Z" level=info msg="StartContainer for \"c2847eac658b45cbe0620da811b5719e3c11c9b4ce773664a4e253f4cb0f4193\" returns successfully" May 17 00:56:59.426180 systemd-networkd[1064]: calicfb7ea7220e: Gained IPv6LL May 17 00:56:59.746021 systemd-networkd[1064]: cali14f9345cc86: Gained IPv6LL May 17 00:56:59.813597 env[1272]: time="2025-05-17T00:56:59.813568550Z" level=info msg="StopPodSandbox for \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\"" May 17 00:57:00.506000 audit[4071]: NETFILTER_CFG table=filter:110 family=2 entries=20 op=nft_register_rule pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:00.506000 audit[4071]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd5a478f00 a2=0 a3=7ffd5a478eec items=0 ppid=2246 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:00.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:00.510000 audit[4071]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:00.510000 audit[4071]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd5a478f00 a2=0 a3=0 items=0 ppid=2246 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:00.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.453 [INFO][4055] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.454 [INFO][4055] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" iface="eth0" netns="/var/run/netns/cni-ef6094e9-3f27-4b08-6439-a8d0a1fa5dd0" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.454 [INFO][4055] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" iface="eth0" netns="/var/run/netns/cni-ef6094e9-3f27-4b08-6439-a8d0a1fa5dd0" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.454 [INFO][4055] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" iface="eth0" netns="/var/run/netns/cni-ef6094e9-3f27-4b08-6439-a8d0a1fa5dd0" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.454 [INFO][4055] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.454 [INFO][4055] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.515 [INFO][4066] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.515 [INFO][4066] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.515 [INFO][4066] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.523 [WARNING][4066] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.523 [INFO][4066] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.523 [INFO][4066] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:00.529759 env[1272]: 2025-05-17 00:57:00.528 [INFO][4055] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:57:00.551811 env[1272]: time="2025-05-17T00:57:00.531614276Z" level=info msg="TearDown network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\" successfully" May 17 00:57:00.551811 env[1272]: time="2025-05-17T00:57:00.531643361Z" level=info msg="StopPodSandbox for \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\" returns successfully" May 17 00:57:00.531502 systemd[1]: run-netns-cni\x2def6094e9\x2d3f27\x2d4b08\x2d6439\x2da8d0a1fa5dd0.mount: Deactivated successfully. May 17 00:57:00.898034 systemd-networkd[1064]: cali0460272fc49: Gained IPv6LL May 17 00:57:02.120000 audit[4032]: AVC avc: denied { getattr } for pid=4032 comm="coredns" path="cgroup:[4026532884]" dev="nsfs" ino=4026532884 scontext=system_u:system_r:svirt_lxc_net_t:s0:c621,c830 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:57:02.120000 audit[4032]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4ed8 a3=0 items=0 ppid=3978 pid=4032 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c621,c830 key=(null) May 17 00:57:02.120000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:57:02.442468 env[1272]: time="2025-05-17T00:57:02.442252228Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:02.530425 env[1272]: time="2025-05-17T00:57:02.530177397Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:02.584707 env[1272]: time="2025-05-17T00:57:02.584674633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:02.614741 env[1272]: time="2025-05-17T00:57:02.614367329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:02.614741 env[1272]: time="2025-05-17T00:57:02.614608937Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:57:03.024160 kubelet[2102]: I0517 00:57:00.479799 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-x7hw7" podStartSLOduration=43.361570227 podStartE2EDuration="43.361570227s" podCreationTimestamp="2025-05-17 00:56:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:57:00.36140724 +0000 UTC m=+47.762241690" watchObservedRunningTime="2025-05-17 00:57:00.361570227 +0000 UTC m=+47.762404678" May 17 00:57:03.916646 env[1272]: time="2025-05-17T00:57:03.916604539Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-9pqww,Uid:875b9cdb-b513-48de-839e-dca19733e94b,Namespace:kube-system,Attempt:1,}" May 17 00:57:04.374168 env[1272]: time="2025-05-17T00:57:04.374077112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:57:04.471374 systemd-networkd[1064]: cali4daab8ca7ad: Link UP May 17 00:57:04.475700 systemd-networkd[1064]: cali4daab8ca7ad: Gained carrier May 17 00:57:04.483010 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4daab8ca7ad: link becomes ready May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.274 [INFO][4083] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0 coredns-7c65d6cfc9- kube-system 875b9cdb-b513-48de-839e-dca19733e94b 987 0 2025-05-17 00:56:17 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7c65d6cfc9-9pqww eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4daab8ca7ad [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9pqww" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--9pqww-" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.281 [INFO][4083] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9pqww" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.367 [INFO][4099] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" HandleID="k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.367 [INFO][4099] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" HandleID="k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cf8a0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7c65d6cfc9-9pqww", "timestamp":"2025-05-17 00:57:04.367258254 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.367 [INFO][4099] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.367 [INFO][4099] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.367 [INFO][4099] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.412 [INFO][4099] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.423 [INFO][4099] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.427 [INFO][4099] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.430 [INFO][4099] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.432 [INFO][4099] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.432 [INFO][4099] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.433 [INFO][4099] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.439 [INFO][4099] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.467 [INFO][4099] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.467 [INFO][4099] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" host="localhost" May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.468 [INFO][4099] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:04.544480 env[1272]: 2025-05-17 00:57:04.468 [INFO][4099] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" HandleID="k8s-pod-network.aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:04.574328 env[1272]: 2025-05-17 00:57:04.469 [INFO][4083] cni-plugin/k8s.go 418: Populated endpoint ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9pqww" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"875b9cdb-b513-48de-839e-dca19733e94b", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7c65d6cfc9-9pqww", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4daab8ca7ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:04.574328 env[1272]: 2025-05-17 00:57:04.469 [INFO][4083] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9pqww" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:04.574328 env[1272]: 2025-05-17 00:57:04.469 [INFO][4083] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4daab8ca7ad ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9pqww" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:04.574328 env[1272]: 2025-05-17 00:57:04.472 [INFO][4083] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9pqww" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:04.574328 env[1272]: 2025-05-17 00:57:04.472 [INFO][4083] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9pqww" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"875b9cdb-b513-48de-839e-dca19733e94b", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b", Pod:"coredns-7c65d6cfc9-9pqww", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4daab8ca7ad", MAC:"76:7d:3e:00:13:0f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:04.574328 env[1272]: 2025-05-17 00:57:04.542 [INFO][4083] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-9pqww" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:57:04.689127 kernel: kauditd_printk_skb: 296 callbacks suppressed May 17 00:57:04.711305 kernel: audit: type=1325 audit(1747443424.685:1206): table=filter:112 family=2 entries=44 op=nft_register_chain pid=4112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:57:04.731686 kernel: audit: type=1300 audit(1747443424.685:1206): arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7ffebe68cd40 a2=0 a3=7ffebe68cd2c items=0 ppid=3335 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:04.752504 kernel: audit: type=1327 audit(1747443424.685:1206): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:57:04.685000 audit[4112]: NETFILTER_CFG table=filter:112 family=2 entries=44 op=nft_register_chain pid=4112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:57:04.685000 audit[4112]: SYSCALL arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7ffebe68cd40 a2=0 a3=7ffebe68cd2c items=0 ppid=3335 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:04.685000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:57:04.825807 env[1272]: time="2025-05-17T00:57:04.825776295Z" level=info msg="CreateContainer within sandbox \"8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:57:04.833935 env[1272]: time="2025-05-17T00:57:04.833688236Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:57:04.833935 env[1272]: time="2025-05-17T00:57:04.833764120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:57:04.833935 env[1272]: time="2025-05-17T00:57:04.833772830Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:57:04.836206 env[1272]: time="2025-05-17T00:57:04.835121043Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b pid=4123 runtime=io.containerd.runc.v2 May 17 00:57:04.847170 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2104900205.mount: Deactivated successfully. May 17 00:57:04.857900 env[1272]: time="2025-05-17T00:57:04.857853758Z" level=info msg="CreateContainer within sandbox \"8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"508ebecd7bde661a0d1565b07afdfe8d8cbdc4c9a84f5c58204bcb8d398e2bda\"" May 17 00:57:04.880416 env[1272]: time="2025-05-17T00:57:04.880382781Z" level=info msg="StartContainer for \"508ebecd7bde661a0d1565b07afdfe8d8cbdc4c9a84f5c58204bcb8d398e2bda\"" May 17 00:57:04.901308 kubelet[2102]: E0517 00:57:04.899505 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="3.38s" May 17 00:57:04.934980 systemd[1]: Started cri-containerd-aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b.scope. May 17 00:57:04.952079 env[1272]: time="2025-05-17T00:57:04.950949496Z" level=info msg="StopPodSandbox for \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\"" May 17 00:57:04.952079 env[1272]: time="2025-05-17T00:57:04.951661533Z" level=info msg="StopPodSandbox for \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\"" May 17 00:57:04.955146 systemd[1]: Started cri-containerd-508ebecd7bde661a0d1565b07afdfe8d8cbdc4c9a84f5c58204bcb8d398e2bda.scope. May 17 00:57:04.969265 systemd[1]: run-containerd-runc-k8s.io-508ebecd7bde661a0d1565b07afdfe8d8cbdc4c9a84f5c58204bcb8d398e2bda-runc.Ah9nk4.mount: Deactivated successfully. May 17 00:57:05.006177 kernel: audit: type=1400 audit(1747443424.993:1207): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.006291 kernel: audit: type=1400 audit(1747443424.993:1208): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.006313 kernel: audit: type=1400 audit(1747443424.993:1209): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.006329 kernel: audit: type=1400 audit(1747443424.993:1210): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.012525 kernel: audit: type=1400 audit(1747443424.993:1211): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.017895 kernel: audit: type=1400 audit(1747443424.993:1212): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.021905 kernel: audit: type=1400 audit(1747443424.993:1213): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:04.994000 audit: BPF prog-id=185 op=LOAD May 17 00:57:05.014000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4123 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343331356563633037613563373339383431626666333630343836 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4123 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343331356563633037613563373339383431626666333630343836 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.014000 audit: BPF prog-id=186 op=LOAD May 17 00:57:05.014000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003004d0 items=0 ppid=4123 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343331356563633037613563373339383431626666333630343836 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit: BPF prog-id=187 op=LOAD May 17 00:57:05.016000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300518 items=0 ppid=4123 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343331356563633037613563373339383431626666333630343836 May 17 00:57:05.016000 audit: BPF prog-id=187 op=UNLOAD May 17 00:57:05.016000 audit: BPF prog-id=186 op=UNLOAD May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.016000 audit: BPF prog-id=188 op=LOAD May 17 00:57:05.016000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000300928 items=0 ppid=4123 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343331356563633037613563373339383431626666333630343836 May 17 00:57:05.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.078000 audit: BPF prog-id=189 op=LOAD May 17 00:57:05.079000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.079000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3732 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386562656364376264653636316130643135363562303761666466 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3732 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386562656364376264653636316130643135363562303761666466 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit: BPF prog-id=190 op=LOAD May 17 00:57:05.080000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028ee70 items=0 ppid=3732 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386562656364376264653636316130643135363562303761666466 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit: BPF prog-id=191 op=LOAD May 17 00:57:05.080000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028eeb8 items=0 ppid=3732 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386562656364376264653636316130643135363562303761666466 May 17 00:57:05.080000 audit: BPF prog-id=191 op=UNLOAD May 17 00:57:05.080000 audit: BPF prog-id=190 op=UNLOAD May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.080000 audit: BPF prog-id=192 op=LOAD May 17 00:57:05.080000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028f2c8 items=0 ppid=3732 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530386562656364376264653636316130643135363562303761666466 May 17 00:57:05.024131 systemd-resolved[1207]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:57:05.119214 env[1272]: time="2025-05-17T00:57:05.109473940Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-9pqww,Uid:875b9cdb-b513-48de-839e-dca19733e94b,Namespace:kube-system,Attempt:1,} returns sandbox id \"aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b\"" May 17 00:57:05.135012 env[1272]: time="2025-05-17T00:57:05.134981697Z" level=info msg="StartContainer for \"508ebecd7bde661a0d1565b07afdfe8d8cbdc4c9a84f5c58204bcb8d398e2bda\" returns successfully" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.125 [INFO][4195] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.125 [INFO][4195] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" iface="eth0" netns="/var/run/netns/cni-5f9d5fe6-1d07-fb54-e9f5-1fdfcfe5068f" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.126 [INFO][4195] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" iface="eth0" netns="/var/run/netns/cni-5f9d5fe6-1d07-fb54-e9f5-1fdfcfe5068f" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.126 [INFO][4195] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" iface="eth0" netns="/var/run/netns/cni-5f9d5fe6-1d07-fb54-e9f5-1fdfcfe5068f" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.126 [INFO][4195] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.126 [INFO][4195] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.141 [INFO][4224] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.141 [INFO][4224] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.141 [INFO][4224] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.195 [WARNING][4224] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.195 [INFO][4224] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.215 [INFO][4224] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:05.224737 env[1272]: 2025-05-17 00:57:05.216 [INFO][4195] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:05.222096 systemd[1]: run-netns-cni\x2d5f9d5fe6\x2d1d07\x2dfb54\x2de9f5\x2d1fdfcfe5068f.mount: Deactivated successfully. May 17 00:57:05.240115 env[1272]: time="2025-05-17T00:57:05.225068256Z" level=info msg="TearDown network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\" successfully" May 17 00:57:05.240115 env[1272]: time="2025-05-17T00:57:05.225096361Z" level=info msg="StopPodSandbox for \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\" returns successfully" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.150 [INFO][4190] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.150 [INFO][4190] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" iface="eth0" netns="/var/run/netns/cni-77081089-1595-6034-f3db-6b96b8c15448" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.150 [INFO][4190] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" iface="eth0" netns="/var/run/netns/cni-77081089-1595-6034-f3db-6b96b8c15448" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.150 [INFO][4190] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" iface="eth0" netns="/var/run/netns/cni-77081089-1595-6034-f3db-6b96b8c15448" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.150 [INFO][4190] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.150 [INFO][4190] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.194 [INFO][4231] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.194 [INFO][4231] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.217 [INFO][4231] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.243 [WARNING][4231] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.245 [INFO][4231] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.245 [INFO][4231] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:05.248822 env[1272]: 2025-05-17 00:57:05.247 [INFO][4190] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 00:57:05.273222 env[1272]: time="2025-05-17T00:57:05.249079702Z" level=info msg="TearDown network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\" successfully" May 17 00:57:05.273222 env[1272]: time="2025-05-17T00:57:05.249099231Z" level=info msg="StopPodSandbox for \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\" returns successfully" May 17 00:57:05.521419 env[1272]: time="2025-05-17T00:57:05.521154546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5759b4fc68-kk5rr,Uid:a96f418b-1185-4aa2-85fc-983c990d5025,Namespace:calico-system,Attempt:1,}" May 17 00:57:05.521419 env[1272]: time="2025-05-17T00:57:05.521234512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-ws46h,Uid:aa6e114e-decb-446a-8bda-8dbdb7e8f8a5,Namespace:calico-system,Attempt:1,}" May 17 00:57:05.533564 env[1272]: time="2025-05-17T00:57:05.533526679Z" level=info msg="CreateContainer within sandbox \"aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:57:05.571220 env[1272]: time="2025-05-17T00:57:05.571180219Z" level=info msg="CreateContainer within sandbox \"aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3052fc19a7846b9399bd3d501110dad83959794e6d81e2fb31ed65519f9061df\"" May 17 00:57:05.571905 env[1272]: time="2025-05-17T00:57:05.571861663Z" level=info msg="StartContainer for \"3052fc19a7846b9399bd3d501110dad83959794e6d81e2fb31ed65519f9061df\"" May 17 00:57:05.614764 systemd[1]: Started cri-containerd-3052fc19a7846b9399bd3d501110dad83959794e6d81e2fb31ed65519f9061df.scope. May 17 00:57:05.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit: BPF prog-id=193 op=LOAD May 17 00:57:05.632000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4123 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353266633139613738343662393339396264336435303131313064 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4123 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353266633139613738343662393339396264336435303131313064 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.632000 audit: BPF prog-id=194 op=LOAD May 17 00:57:05.632000 audit[4266]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e3550 items=0 ppid=4123 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353266633139613738343662393339396264336435303131313064 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit: BPF prog-id=195 op=LOAD May 17 00:57:05.633000 audit[4266]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e3598 items=0 ppid=4123 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353266633139613738343662393339396264336435303131313064 May 17 00:57:05.633000 audit: BPF prog-id=195 op=UNLOAD May 17 00:57:05.633000 audit: BPF prog-id=194 op=UNLOAD May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:05.633000 audit: BPF prog-id=196 op=LOAD May 17 00:57:05.633000 audit[4266]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001e39a8 items=0 ppid=4123 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:05.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353266633139613738343662393339396264336435303131313064 May 17 00:57:05.723225 env[1272]: time="2025-05-17T00:57:05.692134101Z" level=info msg="StartContainer for \"3052fc19a7846b9399bd3d501110dad83959794e6d81e2fb31ed65519f9061df\" returns successfully" May 17 00:57:05.872418 systemd-networkd[1064]: cali0157978191f: Link UP May 17 00:57:05.879782 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:57:05.879867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0157978191f: link becomes ready May 17 00:57:05.880062 systemd-networkd[1064]: cali0157978191f: Gained carrier May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.669 [INFO][4240] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0 goldmane-8f77d7b6c- calico-system aa6e114e-decb-446a-8bda-8dbdb7e8f8a5 1005 0 2025-05-17 00:56:27 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:8f77d7b6c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-8f77d7b6c-ws46h eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali0157978191f [] [] }} ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Namespace="calico-system" Pod="goldmane-8f77d7b6c-ws46h" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--ws46h-" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.669 [INFO][4240] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Namespace="calico-system" Pod="goldmane-8f77d7b6c-ws46h" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.797 [INFO][4300] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" HandleID="k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.797 [INFO][4300] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" HandleID="k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9020), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-8f77d7b6c-ws46h", "timestamp":"2025-05-17 00:57:05.797636977 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.797 [INFO][4300] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.797 [INFO][4300] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.797 [INFO][4300] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.802 [INFO][4300] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.809 [INFO][4300] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.840 [INFO][4300] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.841 [INFO][4300] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.842 [INFO][4300] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.842 [INFO][4300] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.843 [INFO][4300] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.852 [INFO][4300] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.866 [INFO][4300] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.866 [INFO][4300] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" host="localhost" May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.867 [INFO][4300] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:05.911499 env[1272]: 2025-05-17 00:57:05.867 [INFO][4300] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" HandleID="k8s-pod-network.75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.913716 env[1272]: 2025-05-17 00:57:05.868 [INFO][4240] cni-plugin/k8s.go 418: Populated endpoint ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Namespace="calico-system" Pod="goldmane-8f77d7b6c-ws46h" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-8f77d7b6c-ws46h", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0157978191f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:05.913716 env[1272]: 2025-05-17 00:57:05.869 [INFO][4240] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Namespace="calico-system" Pod="goldmane-8f77d7b6c-ws46h" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.913716 env[1272]: 2025-05-17 00:57:05.869 [INFO][4240] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0157978191f ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Namespace="calico-system" Pod="goldmane-8f77d7b6c-ws46h" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.913716 env[1272]: 2025-05-17 00:57:05.880 [INFO][4240] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Namespace="calico-system" Pod="goldmane-8f77d7b6c-ws46h" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.913716 env[1272]: 2025-05-17 00:57:05.880 [INFO][4240] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Namespace="calico-system" Pod="goldmane-8f77d7b6c-ws46h" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe", Pod:"goldmane-8f77d7b6c-ws46h", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0157978191f", MAC:"3a:cd:d2:43:47:5c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:05.913716 env[1272]: 2025-05-17 00:57:05.905 [INFO][4240] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe" Namespace="calico-system" Pod="goldmane-8f77d7b6c-ws46h" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:05.929846 kubelet[2102]: I0517 00:57:05.925124 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-68867d4df7-cxrk5" podStartSLOduration=33.244767845 podStartE2EDuration="39.911017218s" podCreationTimestamp="2025-05-17 00:56:26 +0000 UTC" firstStartedPulling="2025-05-17 00:56:57.499192127 +0000 UTC m=+44.900026573" lastFinishedPulling="2025-05-17 00:57:04.165441487 +0000 UTC m=+51.566275946" observedRunningTime="2025-05-17 00:57:05.603917705 +0000 UTC m=+53.004752177" watchObservedRunningTime="2025-05-17 00:57:05.911017218 +0000 UTC m=+53.311851677" May 17 00:57:05.949660 systemd[1]: run-netns-cni\x2d77081089\x2d1595\x2d6034\x2df3db\x2d6b96b8c15448.mount: Deactivated successfully. May 17 00:57:05.961666 env[1272]: time="2025-05-17T00:57:05.961599104Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:57:05.962010 env[1272]: time="2025-05-17T00:57:05.961641536Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:57:05.962010 env[1272]: time="2025-05-17T00:57:05.961649478Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:57:05.962010 env[1272]: time="2025-05-17T00:57:05.961764929Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe pid=4331 runtime=io.containerd.runc.v2 May 17 00:57:05.978000 audit[4280]: AVC avc: denied { getattr } for pid=4280 comm="coredns" path="cgroup:[4026533005]" dev="nsfs" ino=4026533005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c372,c621 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:57:05.978000 audit[4280]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c318 a2=c0000c0b98 a3=0 items=0 ppid=4123 pid=4280 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c372,c621 key=(null) May 17 00:57:05.978000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:57:05.982232 systemd[1]: Started cri-containerd-75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe.scope. May 17 00:57:06.025519 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali30f12453227: link becomes ready May 17 00:57:06.025327 systemd-networkd[1064]: cali30f12453227: Link UP May 17 00:57:06.025419 systemd-networkd[1064]: cali30f12453227: Gained carrier May 17 00:57:06.043571 systemd[1]: run-containerd-runc-k8s.io-75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe-runc.KcyVw7.mount: Deactivated successfully. May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.713 [INFO][4238] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0 calico-kube-controllers-5759b4fc68- calico-system a96f418b-1185-4aa2-85fc-983c990d5025 1006 0 2025-05-17 00:56:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5759b4fc68 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5759b4fc68-kk5rr eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali30f12453227 [] [] }} ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Namespace="calico-system" Pod="calico-kube-controllers-5759b4fc68-kk5rr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.713 [INFO][4238] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Namespace="calico-system" Pod="calico-kube-controllers-5759b4fc68-kk5rr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.815 [INFO][4305] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" HandleID="k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.815 [INFO][4305] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" HandleID="k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5759b4fc68-kk5rr", "timestamp":"2025-05-17 00:57:05.815545479 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.815 [INFO][4305] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.866 [INFO][4305] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.866 [INFO][4305] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.905 [INFO][4305] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.925 [INFO][4305] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.961 [INFO][4305] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.972 [INFO][4305] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.983 [INFO][4305] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.983 [INFO][4305] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.986 [INFO][4305] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:05.993 [INFO][4305] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:06.020 [INFO][4305] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:06.020 [INFO][4305] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" host="localhost" May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:06.020 [INFO][4305] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:06.080311 env[1272]: 2025-05-17 00:57:06.020 [INFO][4305] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" HandleID="k8s-pod-network.e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:06.088718 env[1272]: 2025-05-17 00:57:06.021 [INFO][4238] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Namespace="calico-system" Pod="calico-kube-controllers-5759b4fc68-kk5rr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0", GenerateName:"calico-kube-controllers-5759b4fc68-", Namespace:"calico-system", SelfLink:"", UID:"a96f418b-1185-4aa2-85fc-983c990d5025", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5759b4fc68", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5759b4fc68-kk5rr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali30f12453227", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:06.088718 env[1272]: 2025-05-17 00:57:06.022 [INFO][4238] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Namespace="calico-system" Pod="calico-kube-controllers-5759b4fc68-kk5rr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:06.088718 env[1272]: 2025-05-17 00:57:06.022 [INFO][4238] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali30f12453227 ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Namespace="calico-system" Pod="calico-kube-controllers-5759b4fc68-kk5rr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:06.088718 env[1272]: 2025-05-17 00:57:06.023 [INFO][4238] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Namespace="calico-system" Pod="calico-kube-controllers-5759b4fc68-kk5rr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:06.088718 env[1272]: 2025-05-17 00:57:06.023 [INFO][4238] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Namespace="calico-system" Pod="calico-kube-controllers-5759b4fc68-kk5rr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0", GenerateName:"calico-kube-controllers-5759b4fc68-", Namespace:"calico-system", SelfLink:"", UID:"a96f418b-1185-4aa2-85fc-983c990d5025", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5759b4fc68", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce", Pod:"calico-kube-controllers-5759b4fc68-kk5rr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali30f12453227", MAC:"a2:e9:d3:eb:bd:e8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:06.088718 env[1272]: 2025-05-17 00:57:06.079 [INFO][4238] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce" Namespace="calico-system" Pod="calico-kube-controllers-5759b4fc68-kk5rr" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 00:57:06.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.117000 audit: BPF prog-id=197 op=LOAD May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4331 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643939666630366236623838336133616132306239623938306331 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4331 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643939666630366236623838336133616132306239623938306331 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit: BPF prog-id=198 op=LOAD May 17 00:57:06.118000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c9ce0 items=0 ppid=4331 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643939666630366236623838336133616132306239623938306331 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit: BPF prog-id=199 op=LOAD May 17 00:57:06.118000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c9d28 items=0 ppid=4331 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643939666630366236623838336133616132306239623938306331 May 17 00:57:06.118000 audit: BPF prog-id=199 op=UNLOAD May 17 00:57:06.118000 audit: BPF prog-id=198 op=UNLOAD May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.118000 audit: BPF prog-id=200 op=LOAD May 17 00:57:06.118000 audit[4342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034e138 items=0 ppid=4331 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643939666630366236623838336133616132306239623938306331 May 17 00:57:06.119957 systemd-resolved[1207]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:57:06.165000 audit[4365]: NETFILTER_CFG table=filter:113 family=2 entries=66 op=nft_register_chain pid=4365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:57:06.165000 audit[4365]: SYSCALL arch=c000003e syscall=46 success=yes exit=32768 a0=3 a1=7ffc47104e60 a2=0 a3=7ffc47104e4c items=0 ppid=3335 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.165000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:57:06.176393 env[1272]: time="2025-05-17T00:57:06.176346937Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:57:06.176523 env[1272]: time="2025-05-17T00:57:06.176508325Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:57:06.176585 env[1272]: time="2025-05-17T00:57:06.176571505Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:57:06.178949 env[1272]: time="2025-05-17T00:57:06.178926671Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce pid=4378 runtime=io.containerd.runc.v2 May 17 00:57:06.198922 systemd[1]: Started cri-containerd-e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce.scope. May 17 00:57:06.275397 env[1272]: time="2025-05-17T00:57:06.275362815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-ws46h,Uid:aa6e114e-decb-446a-8bda-8dbdb7e8f8a5,Namespace:calico-system,Attempt:1,} returns sandbox id \"75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe\"" May 17 00:57:06.338025 systemd-networkd[1064]: cali4daab8ca7ad: Gained IPv6LL May 17 00:57:06.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.356000 audit: BPF prog-id=201 op=LOAD May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4378 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533656431316633383734336263393935366265396264316561653739 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4378 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533656431316633383734336263393935366265396264316561653739 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit: BPF prog-id=202 op=LOAD May 17 00:57:06.357000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d5cd0 items=0 ppid=4378 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533656431316633383734336263393935366265396264316561653739 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit: BPF prog-id=203 op=LOAD May 17 00:57:06.357000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d5d18 items=0 ppid=4378 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533656431316633383734336263393935366265396264316561653739 May 17 00:57:06.357000 audit: BPF prog-id=203 op=UNLOAD May 17 00:57:06.357000 audit: BPF prog-id=202 op=UNLOAD May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { perfmon } for pid=4388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit[4388]: AVC avc: denied { bpf } for pid=4388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:06.357000 audit: BPF prog-id=204 op=LOAD May 17 00:57:06.357000 audit[4388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dc128 items=0 ppid=4378 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533656431316633383734336263393935366265396264316561653739 May 17 00:57:06.358741 systemd-resolved[1207]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:57:06.403872 env[1272]: time="2025-05-17T00:57:06.403789508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5759b4fc68-kk5rr,Uid:a96f418b-1185-4aa2-85fc-983c990d5025,Namespace:calico-system,Attempt:1,} returns sandbox id \"e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce\"" May 17 00:57:06.453000 audit[4418]: NETFILTER_CFG table=filter:114 family=2 entries=58 op=nft_register_chain pid=4418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:57:06.453000 audit[4418]: SYSCALL arch=c000003e syscall=46 success=yes exit=27148 a0=3 a1=7ffed38d4a30 a2=0 a3=7ffed38d4a1c items=0 ppid=3335 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:06.453000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:57:06.558113 kubelet[2102]: I0517 00:57:06.558088 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:57:06.613491 kubelet[2102]: I0517 00:57:06.613454 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-9pqww" podStartSLOduration=49.613442104 podStartE2EDuration="49.613442104s" podCreationTimestamp="2025-05-17 00:56:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:57:06.583479558 +0000 UTC m=+53.984314016" watchObservedRunningTime="2025-05-17 00:57:06.613442104 +0000 UTC m=+54.014276562" May 17 00:57:06.884790 env[1272]: time="2025-05-17T00:57:06.884762605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:06.984657 env[1272]: time="2025-05-17T00:57:06.984623120Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:07.001000 audit[4421]: NETFILTER_CFG table=filter:115 family=2 entries=17 op=nft_register_rule pid=4421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:07.001000 audit[4421]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff371198e0 a2=0 a3=7fff371198cc items=0 ppid=2246 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:07.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:07.029734 env[1272]: time="2025-05-17T00:57:07.029700874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:07.044845 env[1272]: time="2025-05-17T00:57:07.044812090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:07.045286 env[1272]: time="2025-05-17T00:57:07.045263410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:57:07.046352 env[1272]: time="2025-05-17T00:57:07.046333968Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:57:07.050072 env[1272]: time="2025-05-17T00:57:07.050040040Z" level=info msg="CreateContainer within sandbox \"75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:57:07.070000 audit[4421]: NETFILTER_CFG table=nat:116 family=2 entries=35 op=nft_register_chain pid=4421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:07.070000 audit[4421]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff371198e0 a2=0 a3=7fff371198cc items=0 ppid=2246 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:07.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:07.297000 audit[4424]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:07.297000 audit[4424]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffedc659b00 a2=0 a3=7ffedc659aec items=0 ppid=2246 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:07.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:07.426080 systemd-networkd[1064]: cali30f12453227: Gained IPv6LL May 17 00:57:07.536000 audit[4424]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=4424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:07.536000 audit[4424]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffedc659b00 a2=0 a3=7ffedc659aec items=0 ppid=2246 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:07.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:07.748729 systemd-networkd[1064]: cali0157978191f: Gained IPv6LL May 17 00:57:07.893133 env[1272]: time="2025-05-17T00:57:07.893059827Z" level=info msg="CreateContainer within sandbox \"75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"864041b9e57c42ea02538adbfd9db526f2e493521d2ac9fcff1fdd2cb77c7db8\"" May 17 00:57:07.893661 env[1272]: time="2025-05-17T00:57:07.893647246Z" level=info msg="StartContainer for \"864041b9e57c42ea02538adbfd9db526f2e493521d2ac9fcff1fdd2cb77c7db8\"" May 17 00:57:07.907635 systemd[1]: Started cri-containerd-864041b9e57c42ea02538adbfd9db526f2e493521d2ac9fcff1fdd2cb77c7db8.scope. May 17 00:57:07.947581 systemd[1]: run-containerd-runc-k8s.io-864041b9e57c42ea02538adbfd9db526f2e493521d2ac9fcff1fdd2cb77c7db8-runc.OVm68N.mount: Deactivated successfully. May 17 00:57:07.951000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc6a83104d8 items=0 ppid=3782 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:07.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836343034316239653537633432656130323533386164626664396462 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.951000 audit: BPF prog-id=205 op=LOAD May 17 00:57:07.951000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002213a8 items=0 ppid=3782 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:07.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836343034316239653537633432656130323533386164626664396462 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit: BPF prog-id=206 op=LOAD May 17 00:57:07.952000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002213f8 items=0 ppid=3782 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:07.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836343034316239653537633432656130323533386164626664396462 May 17 00:57:07.952000 audit: BPF prog-id=206 op=UNLOAD May 17 00:57:07.952000 audit: BPF prog-id=205 op=UNLOAD May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:07.952000 audit: BPF prog-id=207 op=LOAD May 17 00:57:07.952000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000221488 items=0 ppid=3782 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:07.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836343034316239653537633432656130323533386164626664396462 May 17 00:57:07.990138 env[1272]: time="2025-05-17T00:57:07.990094185Z" level=info msg="StartContainer for \"864041b9e57c42ea02538adbfd9db526f2e493521d2ac9fcff1fdd2cb77c7db8\" returns successfully" May 17 00:57:08.076764 env[1272]: time="2025-05-17T00:57:08.076733764Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:08.135000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:08.135000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:08.135000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e466e0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:57:08.135000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:57:08.135000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001227b0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:57:08.135000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:57:08.170970 env[1272]: time="2025-05-17T00:57:08.170939838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:08.207539 env[1272]: time="2025-05-17T00:57:08.207506458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:08.246217 env[1272]: time="2025-05-17T00:57:08.246189050Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:08.246448 env[1272]: time="2025-05-17T00:57:08.246424302Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:57:08.247486 env[1272]: time="2025-05-17T00:57:08.247473674Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:57:08.258389 env[1272]: time="2025-05-17T00:57:08.258358768Z" level=info msg="CreateContainer within sandbox \"b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:57:08.689000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:08.689000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c006155e00 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:57:08.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:57:08.709000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:08.709000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c006155e30 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:57:08.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:57:08.709000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:08.709000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011d5b9e0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:57:08.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:57:08.819000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:08.819000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c004b832e0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:57:08.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:57:08.847000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:08.847000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c004b83300 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:57:08.847000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:57:08.858000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:08.858000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011d5bad0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:57:08.858000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:57:08.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit: BPF prog-id=208 op=LOAD May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3880 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:08.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653730333732323732363936336538363637653333383336663336 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3880 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:08.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653730333732323732363936336538363637653333383336663336 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit: BPF prog-id=209 op=LOAD May 17 00:57:08.974000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002e9ec0 items=0 ppid=3880 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:08.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653730333732323732363936336538363637653333383336663336 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.974000 audit: BPF prog-id=210 op=LOAD May 17 00:57:08.974000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002e9f08 items=0 ppid=3880 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:08.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653730333732323732363936336538363637653333383336663336 May 17 00:57:08.974000 audit: BPF prog-id=210 op=UNLOAD May 17 00:57:08.975000 audit: BPF prog-id=209 op=UNLOAD May 17 00:57:08.975000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:08.975000 audit: BPF prog-id=211 op=LOAD May 17 00:57:08.975000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c6318 items=0 ppid=3880 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:08.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436653730333732323732363936336538363637653333383336663336 May 17 00:57:09.093812 env[1272]: time="2025-05-17T00:57:08.921744309Z" level=info msg="CreateContainer within sandbox \"b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"46e703722726963e8667e33836f36fd53570dc9b7c5af7aa5fd1961ae93c9db5\"" May 17 00:57:09.093812 env[1272]: time="2025-05-17T00:57:08.922275964Z" level=info msg="StartContainer for \"46e703722726963e8667e33836f36fd53570dc9b7c5af7aa5fd1961ae93c9db5\"" May 17 00:57:09.093812 env[1272]: time="2025-05-17T00:57:09.051087249Z" level=info msg="StartContainer for \"46e703722726963e8667e33836f36fd53570dc9b7c5af7aa5fd1961ae93c9db5\" returns successfully" May 17 00:57:08.957515 systemd[1]: run-containerd-runc-k8s.io-46e703722726963e8667e33836f36fd53570dc9b7c5af7aa5fd1961ae93c9db5-runc.GHMphr.mount: Deactivated successfully. May 17 00:57:08.961516 systemd[1]: Started cri-containerd-46e703722726963e8667e33836f36fd53570dc9b7c5af7aa5fd1961ae93c9db5.scope. May 17 00:57:10.082000 audit[4496]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:10.084293 kernel: kauditd_printk_skb: 423 callbacks suppressed May 17 00:57:10.099408 kernel: audit: type=1325 audit(1747443430.082:1336): table=filter:119 family=2 entries=14 op=nft_register_rule pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:10.131105 kernel: audit: type=1300 audit(1747443430.082:1336): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff0056c340 a2=0 a3=7fff0056c32c items=0 ppid=2246 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:10.131212 kernel: audit: type=1327 audit(1747443430.082:1336): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:10.137145 kernel: audit: type=1325 audit(1747443430.091:1337): table=nat:120 family=2 entries=20 op=nft_register_rule pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:10.137192 kernel: audit: type=1300 audit(1747443430.091:1337): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff0056c340 a2=0 a3=7fff0056c32c items=0 ppid=2246 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:10.137208 kernel: audit: type=1327 audit(1747443430.091:1337): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:10.082000 audit[4496]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff0056c340 a2=0 a3=7fff0056c32c items=0 ppid=2246 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:10.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:10.091000 audit[4496]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:10.091000 audit[4496]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff0056c340 a2=0 a3=7fff0056c32c items=0 ppid=2246 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:10.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:10.792194 kubelet[2102]: I0517 00:57:10.792159 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:57:12.180000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:12.206834 kernel: audit: type=1400 audit(1747443432.180:1338): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:12.206917 kernel: audit: type=1300 audit(1747443432.180:1338): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001e47440 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:57:12.206943 kernel: audit: type=1327 audit(1747443432.180:1338): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:57:12.180000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001e47440 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:57:12.180000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:57:12.389000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:12.403636 kernel: audit: type=1400 audit(1747443432.389:1339): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:12.389000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014be980 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:57:12.389000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:57:12.431000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:12.431000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014be9e0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:57:12.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:57:12.453000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:57:12.453000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014bea00 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:57:12.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:57:14.842655 env[1272]: time="2025-05-17T00:57:14.842616199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:15.981000 audit[4480]: AVC avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 00:57:16.054097 kernel: kauditd_printk_skb: 8 callbacks suppressed May 17 00:57:16.078057 kernel: audit: type=1400 audit(1747443435.981:1342): avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 00:57:16.078106 kernel: audit: type=1300 audit(1747443435.981:1342): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aa6600 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 00:57:16.088736 kernel: audit: type=1327 audit(1747443435.981:1342): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:57:16.088774 kernel: audit: type=1400 audit(1747443435.981:1343): avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 00:57:16.088793 kernel: audit: type=1300 audit(1747443435.981:1343): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000550c40 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 00:57:16.097863 kernel: audit: type=1327 audit(1747443435.981:1343): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:57:15.981000 audit[4480]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aa6600 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 00:57:15.981000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:57:15.981000 audit[4201]: AVC avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 00:57:15.981000 audit[4201]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000550c40 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 00:57:15.981000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:57:16.186002 env[1272]: time="2025-05-17T00:57:15.998534455Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:16.615667 env[1272]: time="2025-05-17T00:57:16.615627426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:16.617653 env[1272]: time="2025-05-17T00:57:16.617617516Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:57:16.618303 env[1272]: time="2025-05-17T00:57:16.618283431Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:18.023747 env[1272]: time="2025-05-17T00:57:18.023709108Z" level=info msg="StopPodSandbox for \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\"" May 17 00:57:18.261637 env[1272]: time="2025-05-17T00:57:18.261611618Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:57:18.633653 env[1272]: time="2025-05-17T00:57:18.633604878Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:57:18.645839 env[1272]: time="2025-05-17T00:57:18.645304395Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:57:19.092898 kubelet[2102]: E0517 00:57:19.087247 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="5.73s" May 17 00:57:19.378258 kubelet[2102]: E0517 00:57:19.366717 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:57:19.643187 kubelet[2102]: E0517 00:57:19.643124 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:57:19.950574 env[1272]: time="2025-05-17T00:57:19.950540949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:57:20.144537 kubelet[2102]: E0517 00:57:20.144330 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jjdfq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-ws46h_calico-system(aa6e114e-decb-446a-8bda-8dbdb7e8f8a5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:57:20.208317 kubelet[2102]: E0517 00:57:20.173438 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.08s" May 17 00:57:20.221917 env[1272]: time="2025-05-17T00:57:20.206429621Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:57:20.249967 env[1272]: time="2025-05-17T00:57:20.249923301Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:57:20.303793 kubelet[2102]: E0517 00:57:20.303751 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:57:20.345866 kubelet[2102]: E0517 00:57:20.303799 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:57:20.345866 kubelet[2102]: E0517 00:57:20.304040 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f3220a9cd9124e429d43096f605c6b7f,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-dqhvx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7978b49988-n5v9k_calico-system(818ef22a-f243-4e76-9a56-f361deab60e5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:57:20.356367 env[1272]: time="2025-05-17T00:57:20.304468875Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:57:21.671484 kubelet[2102]: E0517 00:57:21.671441 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 00:57:21.952034 kubelet[2102]: E0517 00:57:21.951842 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.11s" May 17 00:57:22.673207 env[1272]: time="2025-05-17T00:57:22.673181049Z" level=info msg="CreateContainer within sandbox \"e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:57:22.753148 env[1272]: time="2025-05-17T00:57:22.753106626Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:22.755761 env[1272]: time="2025-05-17T00:57:22.755728531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:22.762019 env[1272]: time="2025-05-17T00:57:22.761993453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:22.767184 env[1272]: time="2025-05-17T00:57:22.766983723Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:57:22.767489 env[1272]: time="2025-05-17T00:57:22.767476284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:57:22.771219 env[1272]: time="2025-05-17T00:57:22.771200731Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:57:22.771404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1571558777.mount: Deactivated successfully. May 17 00:57:22.820288 env[1272]: time="2025-05-17T00:57:22.778064811Z" level=info msg="CreateContainer within sandbox \"e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e9f04112107ba9f811d73508665bd4bcb2e773f92692a449c401c77d3e29a7ba\"" May 17 00:57:22.820288 env[1272]: time="2025-05-17T00:57:22.781351590Z" level=info msg="StartContainer for \"e9f04112107ba9f811d73508665bd4bcb2e773f92692a449c401c77d3e29a7ba\"" May 17 00:57:22.820288 env[1272]: time="2025-05-17T00:57:22.788867338Z" level=info msg="CreateContainer within sandbox \"75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:57:22.826533 env[1272]: time="2025-05-17T00:57:22.826504706Z" level=info msg="CreateContainer within sandbox \"75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a8b4746732e1aade25316ad1a2ccbcd29cb420ced4ef1ebfc4ba003a40cfa62e\"" May 17 00:57:22.830496 env[1272]: time="2025-05-17T00:57:22.830471424Z" level=info msg="StartContainer for \"a8b4746732e1aade25316ad1a2ccbcd29cb420ced4ef1ebfc4ba003a40cfa62e\"" May 17 00:57:22.886259 systemd[1]: Started cri-containerd-a8b4746732e1aade25316ad1a2ccbcd29cb420ced4ef1ebfc4ba003a40cfa62e.scope. May 17 00:57:22.886975 systemd[1]: Started cri-containerd-e9f04112107ba9f811d73508665bd4bcb2e773f92692a449c401c77d3e29a7ba.scope. May 17 00:57:22.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:23.109459 kernel: audit: type=1400 audit(1747443442.965:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:23.128665 kernel: audit: type=1400 audit(1747443442.965:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:23.128752 kernel: audit: type=1400 audit(1747443442.965:1346): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:23.128778 kernel: audit: type=1400 audit(1747443442.965:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:23.128873 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:57:23.134311 kernel: audit: audit_lost=43 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:57:23.134371 kernel: audit: backlog limit exceeded May 17 00:57:23.136102 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:57:23.136127 kernel: audit: audit_lost=44 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:57:23.138559 kernel: audit: backlog limit exceeded May 17 00:57:22.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.965000 audit: BPF prog-id=212 op=LOAD May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4378 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663034313132313037626139663831316437333530383636356264 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4378 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663034313132313037626139663831316437333530383636356264 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit: BPF prog-id=213 op=LOAD May 17 00:57:22.983000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002a1540 items=0 ppid=4378 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663034313132313037626139663831316437333530383636356264 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit: BPF prog-id=214 op=LOAD May 17 00:57:22.983000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002a1588 items=0 ppid=4378 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663034313132313037626139663831316437333530383636356264 May 17 00:57:22.983000 audit: BPF prog-id=214 op=UNLOAD May 17 00:57:22.983000 audit: BPF prog-id=213 op=UNLOAD May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.983000 audit: BPF prog-id=215 op=LOAD May 17 00:57:22.983000 audit[4549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002a1998 items=0 ppid=4378 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663034313132313037626139663831316437333530383636356264 May 17 00:57:22.985000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.985000 audit[4570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f6220728588 items=0 ppid=3782 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623437343637333265316161646532353331366164316132636362 May 17 00:57:22.985000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.985000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.985000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.985000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.985000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.985000 audit: BPF prog-id=216 op=LOAD May 17 00:57:22.985000 audit[4570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001f8498 items=0 ppid=3782 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623437343637333265316161646532353331366164316132636362 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit: BPF prog-id=217 op=LOAD May 17 00:57:22.994000 audit[4570]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001f84e8 items=0 ppid=3782 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623437343637333265316161646532353331366164316132636362 May 17 00:57:22.994000 audit: BPF prog-id=217 op=UNLOAD May 17 00:57:22.994000 audit: BPF prog-id=216 op=UNLOAD May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { perfmon } for pid=4570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit[4570]: AVC avc: denied { bpf } for pid=4570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:57:22.994000 audit: BPF prog-id=218 op=LOAD May 17 00:57:22.994000 audit[4570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001f8578 items=0 ppid=3782 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:22.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623437343637333265316161646532353331366164316132636362 May 17 00:57:23.184025 env[1272]: time="2025-05-17T00:57:23.070425109Z" level=info msg="StartContainer for \"e9f04112107ba9f811d73508665bd4bcb2e773f92692a449c401c77d3e29a7ba\" returns successfully" May 17 00:57:23.184025 env[1272]: time="2025-05-17T00:57:23.070868622Z" level=info msg="StartContainer for \"a8b4746732e1aade25316ad1a2ccbcd29cb420ced4ef1ebfc4ba003a40cfa62e\" returns successfully" May 17 00:57:23.184025 env[1272]: time="2025-05-17T00:57:23.079120321Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:57:23.184025 env[1272]: time="2025-05-17T00:57:23.081271089Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:57:23.184202 kubelet[2102]: E0517 00:57:23.145389 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 00:57:23.184202 kubelet[2102]: E0517 00:57:23.178103 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:57:23.196238 kubelet[2102]: E0517 00:57:23.196209 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:57:23.205741 kubelet[2102]: E0517 00:57:23.205694 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-dqhvx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7978b49988-n5v9k_calico-system(818ef22a-f243-4e76-9a56-f361deab60e5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:57:23.237786 kubelet[2102]: E0517 00:57:23.237746 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7978b49988-n5v9k" podUID="818ef22a-f243-4e76-9a56-f361deab60e5" May 17 00:57:23.792647 kubelet[2102]: I0517 00:57:23.777618 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-68867d4df7-67kdl" podStartSLOduration=47.73588724 podStartE2EDuration="57.752762033s" podCreationTimestamp="2025-05-17 00:56:26 +0000 UTC" firstStartedPulling="2025-05-17 00:56:58.23034513 +0000 UTC m=+45.631179576" lastFinishedPulling="2025-05-17 00:57:08.247219924 +0000 UTC m=+55.648054369" observedRunningTime="2025-05-17 00:57:09.999609087 +0000 UTC m=+57.400443541" watchObservedRunningTime="2025-05-17 00:57:23.752762033 +0000 UTC m=+71.153596490" May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:22.653 [WARNING][4530] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe", Pod:"goldmane-8f77d7b6c-ws46h", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0157978191f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:22.668 [INFO][4530] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:22.669 [INFO][4530] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" iface="eth0" netns="" May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:22.669 [INFO][4530] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:22.669 [INFO][4530] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:23.796 [INFO][4541] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:23.814 [INFO][4541] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:23.817 [INFO][4541] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:23.923 [WARNING][4541] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:23.923 [INFO][4541] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:23.930 [INFO][4541] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:24.018057 env[1272]: 2025-05-17 00:57:23.980 [INFO][4530] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:24.018057 env[1272]: time="2025-05-17T00:57:24.017972476Z" level=info msg="TearDown network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\" successfully" May 17 00:57:24.018057 env[1272]: time="2025-05-17T00:57:24.017993573Z" level=info msg="StopPodSandbox for \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\" returns successfully" May 17 00:57:24.347000 audit[4625]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:24.347000 audit[4625]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd5781d7d0 a2=0 a3=7ffd5781d7bc items=0 ppid=2246 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:24.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:24.352000 audit[4625]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:24.352000 audit[4625]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd5781d7d0 a2=0 a3=7ffd5781d7bc items=0 ppid=2246 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:24.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:24.611780 env[1272]: time="2025-05-17T00:57:24.611708718Z" level=info msg="RemovePodSandbox for \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\"" May 17 00:57:24.611780 env[1272]: time="2025-05-17T00:57:24.611740147Z" level=info msg="Forcibly stopping sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\"" May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:25.743 [WARNING][4634] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"aa6e114e-decb-446a-8bda-8dbdb7e8f8a5", ResourceVersion:"1096", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75d99ff06b6b883a3aa20b9b980c195aa0cf5438f6868231f418af31c91550fe", Pod:"goldmane-8f77d7b6c-ws46h", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0157978191f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:25.764 [INFO][4634] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:25.764 [INFO][4634] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" iface="eth0" netns="" May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:25.764 [INFO][4634] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:25.764 [INFO][4634] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:26.925 [INFO][4643] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:26.954 [INFO][4643] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:26.966 [INFO][4643] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:27.195 [WARNING][4643] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:27.197 [INFO][4643] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" HandleID="k8s-pod-network.51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" Workload="localhost-k8s-goldmane--8f77d7b6c--ws46h-eth0" May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:27.230 [INFO][4643] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:27.314902 env[1272]: 2025-05-17 00:57:27.267 [INFO][4634] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f" May 17 00:57:27.314902 env[1272]: time="2025-05-17T00:57:27.305042311Z" level=info msg="TearDown network for sandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\" successfully" May 17 00:57:28.181308 env[1272]: time="2025-05-17T00:57:27.448682571Z" level=info msg="RemovePodSandbox \"51e2160357ec746dc142acf62343856d81d49d82699067231a72b635c25e6d2f\" returns successfully" May 17 00:57:29.605414 env[1272]: time="2025-05-17T00:57:29.605323816Z" level=info msg="StopPodSandbox for \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\"" May 17 00:57:29.913525 kubelet[2102]: I0517 00:57:29.913506 2102 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:57:29.940921 kubelet[2102]: I0517 00:57:29.924953 2102 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:57:29.975323 kubelet[2102]: E0517 00:57:29.975221 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="5.101s" May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.078 [WARNING][4685] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0", GenerateName:"calico-apiserver-68867d4df7-", Namespace:"calico-apiserver", SelfLink:"", UID:"b161dca0-0f94-492d-84b9-20d1de419b67", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68867d4df7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137", Pod:"calico-apiserver-68867d4df7-cxrk5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3fd53c92221", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.101 [INFO][4685] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.102 [INFO][4685] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" iface="eth0" netns="" May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.102 [INFO][4685] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.102 [INFO][4685] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.649 [INFO][4692] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.654 [INFO][4692] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.656 [INFO][4692] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.756 [WARNING][4692] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.756 [INFO][4692] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.769 [INFO][4692] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:31.797015 env[1272]: 2025-05-17 00:57:31.784 [INFO][4685] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:57:31.797015 env[1272]: time="2025-05-17T00:57:31.795682700Z" level=info msg="TearDown network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\" successfully" May 17 00:57:31.797015 env[1272]: time="2025-05-17T00:57:31.795710161Z" level=info msg="StopPodSandbox for \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\" returns successfully" May 17 00:57:31.967187 kubelet[2102]: I0517 00:57:31.967153 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:57:32.046506 env[1272]: time="2025-05-17T00:57:32.046479296Z" level=info msg="RemovePodSandbox for \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\"" May 17 00:57:32.046624 env[1272]: time="2025-05-17T00:57:32.046503530Z" level=info msg="Forcibly stopping sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\"" May 17 00:57:32.074677 kubelet[2102]: I0517 00:57:32.002956 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5759b4fc68-kk5rr" podStartSLOduration=52.500887206 podStartE2EDuration="1m3.897868794s" podCreationTimestamp="2025-05-17 00:56:28 +0000 UTC" firstStartedPulling="2025-05-17 00:57:06.47579829 +0000 UTC m=+53.876632736" lastFinishedPulling="2025-05-17 00:57:17.872779873 +0000 UTC m=+65.273614324" observedRunningTime="2025-05-17 00:57:30.275510929 +0000 UTC m=+77.676345375" watchObservedRunningTime="2025-05-17 00:57:31.897868794 +0000 UTC m=+79.298703247" May 17 00:57:32.182837 kubelet[2102]: E0517 00:57:32.182806 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.015s" May 17 00:57:34.083000 audit[4718]: NETFILTER_CFG table=filter:123 family=2 entries=13 op=nft_register_rule pid=4718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:34.362848 kernel: kauditd_printk_skb: 106 callbacks suppressed May 17 00:57:34.380973 kernel: audit: type=1325 audit(1747443454.083:1370): table=filter:123 family=2 entries=13 op=nft_register_rule pid=4718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:34.389596 kernel: audit: type=1300 audit(1747443454.083:1370): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffda5451c30 a2=0 a3=7ffda5451c1c items=0 ppid=2246 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:34.395255 kernel: audit: type=1327 audit(1747443454.083:1370): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:34.395286 kernel: audit: type=1325 audit(1747443454.093:1371): table=nat:124 family=2 entries=27 op=nft_register_chain pid=4718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:34.398686 kernel: audit: type=1300 audit(1747443454.093:1371): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffda5451c30 a2=0 a3=7ffda5451c1c items=0 ppid=2246 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:34.400932 kernel: audit: type=1327 audit(1747443454.093:1371): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:34.083000 audit[4718]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffda5451c30 a2=0 a3=7ffda5451c1c items=0 ppid=2246 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:34.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:34.093000 audit[4718]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=4718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:34.093000 audit[4718]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffda5451c30 a2=0 a3=7ffda5451c1c items=0 ppid=2246 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:34.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:32.934 [WARNING][4706] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0", GenerateName:"calico-apiserver-68867d4df7-", Namespace:"calico-apiserver", SelfLink:"", UID:"b161dca0-0f94-492d-84b9-20d1de419b67", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68867d4df7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c026643350af29450412045fbaad2d16ede76b76d818ca06b7f145a4bde1137", Pod:"calico-apiserver-68867d4df7-cxrk5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3fd53c92221", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:32.975 [INFO][4706] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:32.977 [INFO][4706] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" iface="eth0" netns="" May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:32.977 [INFO][4706] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:32.977 [INFO][4706] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:35.562 [INFO][4713] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:35.574 [INFO][4713] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:35.576 [INFO][4713] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:35.716 [WARNING][4713] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:35.716 [INFO][4713] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" HandleID="k8s-pod-network.30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" Workload="localhost-k8s-calico--apiserver--68867d4df7--cxrk5-eth0" May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:35.721 [INFO][4713] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:35.764461 env[1272]: 2025-05-17 00:57:35.739 [INFO][4706] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a" May 17 00:57:35.764461 env[1272]: time="2025-05-17T00:57:35.764485651Z" level=info msg="TearDown network for sandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\" successfully" May 17 00:57:35.853598 env[1272]: time="2025-05-17T00:57:35.784973883Z" level=info msg="RemovePodSandbox \"30408b09dbe0f2dc259cc2d9677a41c1062bb06a5570453ac5448613d5e1466a\" returns successfully" May 17 00:57:36.733327 env[1272]: time="2025-05-17T00:57:36.733298797Z" level=info msg="StopPodSandbox for \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\"" May 17 00:57:36.802433 kubelet[2102]: I0517 00:57:36.699473 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-tvdvr" podStartSLOduration=43.426832396 podStartE2EDuration="1m8.634458023s" podCreationTimestamp="2025-05-17 00:56:28 +0000 UTC" firstStartedPulling="2025-05-17 00:56:57.563369867 +0000 UTC m=+44.964204315" lastFinishedPulling="2025-05-17 00:57:22.770995496 +0000 UTC m=+70.171829942" observedRunningTime="2025-05-17 00:57:32.630532774 +0000 UTC m=+80.031367232" watchObservedRunningTime="2025-05-17 00:57:36.634458023 +0000 UTC m=+84.035292477" May 17 00:57:36.875773 kubelet[2102]: E0517 00:57:36.875702 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="4.047s" May 17 00:57:37.137074 kubelet[2102]: E0517 00:57:37.133576 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-7978b49988-n5v9k" podUID="818ef22a-f243-4e76-9a56-f361deab60e5" May 17 00:57:37.168971 env[1272]: time="2025-05-17T00:57:37.168930110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:57:37.369326 kubelet[2102]: I0517 00:57:37.354358 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:57:37.551199 env[1272]: time="2025-05-17T00:57:37.551134164Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:57:37.570308 env[1272]: time="2025-05-17T00:57:37.560949707Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:57:37.636468 kubelet[2102]: E0517 00:57:37.629290 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:57:37.859702 kubelet[2102]: E0517 00:57:37.859619 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:57:38.146343 kubelet[2102]: E0517 00:57:38.144915 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jjdfq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-ws46h_calico-system(aa6e114e-decb-446a-8bda-8dbdb7e8f8a5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:57:38.176476 kubelet[2102]: E0517 00:57:38.170629 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:37.766 [WARNING][4738] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"df85e1d5-d638-465a-a2ca-52d913410447", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042", Pod:"coredns-7c65d6cfc9-x7hw7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0460272fc49", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:37.794 [INFO][4738] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:37.794 [INFO][4738] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" iface="eth0" netns="" May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:37.794 [INFO][4738] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:37.794 [INFO][4738] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:38.240 [INFO][4764] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:38.253 [INFO][4764] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:38.255 [INFO][4764] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:38.485 [WARNING][4764] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:38.485 [INFO][4764] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:38.487 [INFO][4764] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:38.538334 env[1272]: 2025-05-17 00:57:38.504 [INFO][4738] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:57:38.590483 env[1272]: time="2025-05-17T00:57:38.539841331Z" level=info msg="TearDown network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\" successfully" May 17 00:57:38.590483 env[1272]: time="2025-05-17T00:57:38.539865449Z" level=info msg="StopPodSandbox for \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\" returns successfully" May 17 00:57:40.905174 env[1272]: time="2025-05-17T00:57:40.899826136Z" level=info msg="RemovePodSandbox for \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\"" May 17 00:57:40.905174 env[1272]: time="2025-05-17T00:57:40.899850576Z" level=info msg="Forcibly stopping sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\"" May 17 00:57:42.402000 audit[4786]: NETFILTER_CFG table=filter:125 family=2 entries=12 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:42.546225 kernel: audit: type=1325 audit(1747443462.402:1372): table=filter:125 family=2 entries=12 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:42.568236 kernel: audit: type=1300 audit(1747443462.402:1372): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd29a39ea0 a2=0 a3=7ffd29a39e8c items=0 ppid=2246 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:42.570339 kernel: audit: type=1327 audit(1747443462.402:1372): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:42.570390 kernel: audit: type=1325 audit(1747443462.412:1373): table=nat:126 family=2 entries=34 op=nft_register_chain pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:42.570418 kernel: audit: type=1300 audit(1747443462.412:1373): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd29a39ea0 a2=0 a3=7ffd29a39e8c items=0 ppid=2246 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:42.570441 kernel: audit: type=1327 audit(1747443462.412:1373): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:42.402000 audit[4786]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd29a39ea0 a2=0 a3=7ffd29a39e8c items=0 ppid=2246 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:42.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:42.412000 audit[4786]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:57:42.412000 audit[4786]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd29a39ea0 a2=0 a3=7ffd29a39e8c items=0 ppid=2246 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:42.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:42.739 [WARNING][4779] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"df85e1d5-d638-465a-a2ca-52d913410447", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f28df7ac1bd403abe6d32bc534204165f3e3dc8d512833d3def81ae351b6e042", Pod:"coredns-7c65d6cfc9-x7hw7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0460272fc49", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:42.806 [INFO][4779] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:42.807 [INFO][4779] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" iface="eth0" netns="" May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:42.807 [INFO][4779] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:42.807 [INFO][4779] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:44.389 [INFO][4788] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:44.425 [INFO][4788] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:44.429 [INFO][4788] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:44.658 [WARNING][4788] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:44.658 [INFO][4788] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" HandleID="k8s-pod-network.dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" Workload="localhost-k8s-coredns--7c65d6cfc9--x7hw7-eth0" May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:44.672 [INFO][4788] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:57:44.865197 env[1272]: 2025-05-17 00:57:44.710 [INFO][4779] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015" May 17 00:57:44.865197 env[1272]: time="2025-05-17T00:57:44.839575482Z" level=info msg="TearDown network for sandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\" successfully" May 17 00:57:45.459375 env[1272]: time="2025-05-17T00:57:44.992948822Z" level=info msg="RemovePodSandbox \"dfe9573b9a23ae55d44253d43334f6e28e01865b9a78b5cd332b0eb7e06f1015\" returns successfully" May 17 00:57:46.567691 env[1272]: time="2025-05-17T00:57:46.567653242Z" level=info msg="StopPodSandbox for \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\"" May 17 00:57:52.868174 systemd[1]: Started sshd@7-139.178.70.101:22-147.75.109.163:55934.service. May 17 00:57:53.066560 kernel: audit: type=1130 audit(1747443472.876:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-147.75.109.163:55934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:57:52.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-147.75.109.163:55934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:57:53.711000 audit[4840]: USER_ACCT pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:57:54.176207 kernel: audit: type=1101 audit(1747443473.711:1375): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:57:54.327877 kernel: audit: type=1103 audit(1747443473.759:1376): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:57:54.350912 kernel: audit: type=1006 audit(1747443473.759:1377): pid=4840 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:57:54.371947 kernel: audit: type=1300 audit(1747443473.759:1377): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1f918230 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:54.433670 kernel: audit: type=1327 audit(1747443473.759:1377): proctitle=737368643A20636F7265205B707269765D May 17 00:57:53.759000 audit[4840]: CRED_ACQ pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:57:53.759000 audit[4840]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1f918230 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:57:53.759000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:57:55.383246 sshd[4840]: Accepted publickey for core from 147.75.109.163 port 55934 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:57:53.789582 sshd[4840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:57:56.486140 systemd-logind[1241]: New session 10 of user core. May 17 00:57:56.593622 kernel: audit: type=1105 audit(1747443476.584:1378): pid=4840 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:57:56.584000 audit[4840]: USER_START pid=4840 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:57:56.503808 systemd[1]: Started session-10.scope. May 17 00:57:56.725000 audit[4845]: CRED_ACQ pid=4845 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:57:56.784247 kernel: audit: type=1103 audit(1747443476.725:1379): pid=4845 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:58:02.005704 env[1272]: 2025-05-17 00:57:51.200 [WARNING][4823] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" WorkloadEndpoint="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:58:02.005704 env[1272]: 2025-05-17 00:57:51.283 [INFO][4823] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:58:02.005704 env[1272]: 2025-05-17 00:57:51.288 [INFO][4823] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" iface="eth0" netns="" May 17 00:58:02.005704 env[1272]: 2025-05-17 00:57:51.288 [INFO][4823] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:58:02.005704 env[1272]: 2025-05-17 00:57:51.288 [INFO][4823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:58:02.005704 env[1272]: 2025-05-17 00:57:57.766 [INFO][4834] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:58:02.005704 env[1272]: 2025-05-17 00:57:57.812 [INFO][4834] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:58:02.005704 env[1272]: 2025-05-17 00:57:57.818 [INFO][4834] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:58:02.005704 env[1272]: 2025-05-17 00:58:00.782 [WARNING][4834] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:58:02.005704 env[1272]: 2025-05-17 00:58:00.865 [INFO][4834] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:58:02.005704 env[1272]: 2025-05-17 00:58:01.554 [INFO][4834] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:58:02.005704 env[1272]: 2025-05-17 00:58:01.934 [INFO][4823] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:58:02.005704 env[1272]: time="2025-05-17T00:58:01.995330885Z" level=info msg="TearDown network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\" successfully" May 17 00:58:02.005704 env[1272]: time="2025-05-17T00:58:01.995361554Z" level=info msg="StopPodSandbox for \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\" returns successfully" May 17 00:58:08.182000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:08.267194 kernel: audit: type=1400 audit(1747443488.182:1380): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:08.269616 kernel: audit: type=1300 audit(1747443488.182:1380): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0032a0db0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:58:08.270527 kernel: audit: type=1327 audit(1747443488.182:1380): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:58:08.271250 kernel: audit: type=1400 audit(1747443488.182:1381): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:08.271950 kernel: audit: type=1300 audit(1747443488.182:1381): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00321c700 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:58:08.271973 kernel: audit: type=1327 audit(1747443488.182:1381): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:58:08.182000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0032a0db0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:58:08.182000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:58:08.182000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:08.182000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00321c700 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:58:08.182000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:58:08.944539 kernel: audit: type=1400 audit(1747443488.936:1382): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:08.955674 kernel: audit: type=1300 audit(1747443488.936:1382): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011d5a300 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:58:08.955748 kernel: audit: type=1327 audit(1747443488.936:1382): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:58:08.936000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:08.936000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011d5a300 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:58:08.936000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:58:08.981000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:08.986496 kernel: audit: type=1400 audit(1747443488.981:1383): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:08.981000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c006998900 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:58:08.981000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:58:09.042000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:09.042000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00d114f60 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:58:09.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:58:09.043000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:09.043000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c006515dc0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:58:09.043000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:58:09.043000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:09.043000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c005d437d0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:58:09.043000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:58:09.044000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:09.044000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c005d43800 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:58:09.044000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:58:12.796000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:12.796000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00321ca40 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:58:12.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:58:12.800000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:12.800000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030fdd20 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:58:12.800000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:58:12.934000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:12.934000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0033ca060 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:58:12.934000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:58:12.939000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:58:12.939000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00321cbe0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:58:12.939000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:58:16.401682 kernel: kauditd_printk_skb: 26 callbacks suppressed May 17 00:58:17.067785 kernel: audit: type=1400 audit(1747443496.381:1392): avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 00:58:17.099116 kernel: audit: type=1400 audit(1747443496.381:1393): avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 00:58:17.099187 kernel: audit: type=1300 audit(1747443496.381:1393): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001e48680 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 00:58:17.107006 kernel: audit: type=1327 audit(1747443496.381:1393): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:58:17.111992 kernel: audit: type=1300 audit(1747443496.381:1392): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016d7fa0 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 00:58:17.112059 kernel: audit: type=1327 audit(1747443496.381:1392): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:58:16.381000 audit[4480]: AVC avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 00:58:16.381000 audit[4201]: AVC avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 00:58:16.381000 audit[4201]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001e48680 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 00:58:16.381000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:58:16.381000 audit[4480]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016d7fa0 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 00:58:16.381000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:58:28.582000 audit[4888]: NETFILTER_CFG table=filter:127 family=2 entries=13 op=nft_register_rule pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:58:28.770171 kernel: audit: type=1325 audit(1747443508.582:1394): table=filter:127 family=2 entries=13 op=nft_register_rule pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:58:28.781772 kernel: audit: type=1300 audit(1747443508.582:1394): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe84b523e0 a2=0 a3=7ffe84b523cc items=0 ppid=2246 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:58:28.781835 kernel: audit: type=1327 audit(1747443508.582:1394): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:58:28.781857 kernel: audit: type=1325 audit(1747443508.595:1395): table=nat:128 family=2 entries=63 op=nft_unregister_chain pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:58:28.781872 kernel: audit: type=1300 audit(1747443508.595:1395): arch=c000003e syscall=46 success=yes exit=14836 a0=3 a1=7ffe84b523e0 a2=0 a3=7ffe84b523cc items=0 ppid=2246 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:58:28.781906 kernel: audit: type=1327 audit(1747443508.595:1395): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:58:28.781935 kernel: audit: type=1325 audit(1747443508.637:1396): table=filter:129 family=2 entries=18 op=nft_register_rule pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:58:28.781955 kernel: audit: type=1300 audit(1747443508.637:1396): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff8290b020 a2=0 a3=7fff8290b00c items=0 ppid=2246 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:58:28.783401 kernel: audit: type=1327 audit(1747443508.637:1396): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:58:28.785176 kernel: audit: type=1325 audit(1747443508.646:1397): table=nat:130 family=2 entries=44 op=nft_unregister_chain pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:58:28.582000 audit[4888]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe84b523e0 a2=0 a3=7ffe84b523cc items=0 ppid=2246 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:58:28.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:58:28.595000 audit[4888]: NETFILTER_CFG table=nat:128 family=2 entries=63 op=nft_unregister_chain pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:58:28.595000 audit[4888]: SYSCALL arch=c000003e syscall=46 success=yes exit=14836 a0=3 a1=7ffe84b523e0 a2=0 a3=7ffe84b523cc items=0 ppid=2246 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:58:28.595000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:58:28.637000 audit[4891]: NETFILTER_CFG table=filter:129 family=2 entries=18 op=nft_register_rule pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:58:28.637000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff8290b020 a2=0 a3=7fff8290b00c items=0 ppid=2246 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:58:28.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:58:28.646000 audit[4891]: NETFILTER_CFG table=nat:130 family=2 entries=44 op=nft_unregister_chain pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:58:28.646000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=3852 a0=3 a1=7fff8290b020 a2=0 a3=7fff8290b00c items=0 ppid=2246 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:58:28.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:58:56.688161 sshd[4840]: pam_unix(sshd:session): session closed for user core May 17 00:58:56.777514 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:58:56.780839 kernel: audit: type=1106 audit(1747443536.737:1398): pid=4840 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:58:56.785999 kernel: audit: type=1104 audit(1747443536.743:1399): pid=4840 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:58:56.786050 kernel: audit: type=1131 audit(1747443536.760:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-147.75.109.163:55934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:58:56.737000 audit[4840]: USER_END pid=4840 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:58:56.743000 audit[4840]: CRED_DISP pid=4840 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:58:56.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-147.75.109.163:55934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:58:56.755187 systemd[1]: sshd@7-139.178.70.101:22-147.75.109.163:55934.service: Deactivated successfully. May 17 00:58:56.770933 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:58:56.771071 systemd[1]: session-10.scope: Consumed 6.625s CPU time. May 17 00:58:56.773033 systemd-logind[1241]: Session 10 logged out. Waiting for processes to exit. May 17 00:58:56.787746 systemd-logind[1241]: Removed session 10. May 17 00:58:57.554147 systemd[1]: run-containerd-runc-k8s.io-e9f04112107ba9f811d73508665bd4bcb2e773f92692a449c401c77d3e29a7ba-runc.VE9D4R.mount: Deactivated successfully. May 17 00:58:57.743981 kubelet[2102]: W0517 00:58:56.791122 2102 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Node ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:57.802349 env[1272]: time="2025-05-17T00:58:57.802236328Z" level=info msg="RemovePodSandbox for \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\"" May 17 00:58:57.802349 env[1272]: time="2025-05-17T00:58:57.802267166Z" level=info msg="Forcibly stopping sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\"" May 17 00:58:58.019503 kubelet[2102]: W0517 00:58:56.846025 2102 reflector.go:484] object-"calico-system"/"tigera-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.027799 kubelet[2102]: W0517 00:58:56.846043 2102 reflector.go:484] object-"calico-system"/"goldmane-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.027799 kubelet[2102]: W0517 00:58:56.846052 2102 reflector.go:484] object-"calico-system"/"cni-config": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.027799 kubelet[2102]: W0517 00:58:56.846061 2102 reflector.go:484] object-"calico-system"/"goldmane": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.027799 kubelet[2102]: W0517 00:58:56.846073 2102 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.027799 kubelet[2102]: W0517 00:58:56.846084 2102 reflector.go:484] object-"calico-system"/"goldmane-key-pair": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.027799 kubelet[2102]: W0517 00:58:56.846092 2102 reflector.go:484] object-"calico-apiserver"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.041146 kubelet[2102]: W0517 00:58:56.846099 2102 reflector.go:484] object-"calico-apiserver"/"calico-apiserver-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.041146 kubelet[2102]: W0517 00:58:57.025746 2102 reflector.go:484] object-"kube-system"/"kube-proxy": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.041146 kubelet[2102]: W0517 00:58:57.152428 2102 reflector.go:484] object-"kube-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.041146 kubelet[2102]: W0517 00:58:57.190574 2102 reflector.go:484] pkg/kubelet/config/apiserver.go:66: watch of *v1.Pod ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:57.202721 2102 reflector.go:484] object-"tigera-operator"/"kubernetes-services-endpoint": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:57.209476 2102 reflector.go:484] object-"tigera-operator"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:57.214504 2102 reflector.go:484] object-"calico-system"/"whisker-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:57.233130 2102 reflector.go:484] object-"calico-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:57.239806 2102 reflector.go:484] object-"calico-system"/"node-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:57.270077 2102 reflector.go:484] object-"kube-system"/"coredns": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:57.325168 2102 reflector.go:484] object-"calico-system"/"whisker-backend-key-pair": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:56.830590 2102 reflector.go:484] object-"calico-system"/"typha-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:58:58.045818 kubelet[2102]: W0517 00:58:57.388288 2102 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:59:00.238671 env[1272]: 2025-05-17 00:58:59.034 [WARNING][4974] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" WorkloadEndpoint="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:59:00.238671 env[1272]: 2025-05-17 00:58:59.069 [INFO][4974] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:59:00.238671 env[1272]: 2025-05-17 00:58:59.070 [INFO][4974] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" iface="eth0" netns="" May 17 00:59:00.238671 env[1272]: 2025-05-17 00:58:59.071 [INFO][4974] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:59:00.238671 env[1272]: 2025-05-17 00:58:59.071 [INFO][4974] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:59:00.238671 env[1272]: 2025-05-17 00:58:59.939 [INFO][4982] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:59:00.238671 env[1272]: 2025-05-17 00:58:59.950 [INFO][4982] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:59:00.238671 env[1272]: 2025-05-17 00:58:59.952 [INFO][4982] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:59:00.238671 env[1272]: 2025-05-17 00:59:00.123 [WARNING][4982] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:59:00.238671 env[1272]: 2025-05-17 00:59:00.133 [INFO][4982] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" HandleID="k8s-pod-network.85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" Workload="localhost-k8s-whisker--59b76bc5b6--mrsfm-eth0" May 17 00:59:00.238671 env[1272]: 2025-05-17 00:59:00.173 [INFO][4982] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:59:00.238671 env[1272]: 2025-05-17 00:59:00.204 [INFO][4974] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9" May 17 00:59:00.238671 env[1272]: time="2025-05-17T00:59:00.234955013Z" level=info msg="TearDown network for sandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\" successfully" May 17 00:59:00.332024 env[1272]: time="2025-05-17T00:59:00.258618017Z" level=info msg="RemovePodSandbox \"85152acd0c6981fcc74406195f769141e0c4a02360f718beb099c8baf2d9c0c9\" returns successfully" May 17 00:59:01.795268 systemd[1]: Started sshd@8-139.178.70.101:22-147.75.109.163:46300.service. May 17 00:59:01.885544 kernel: audit: type=1130 audit(1747443541.798:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.101:22-147.75.109.163:46300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:59:01.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.101:22-147.75.109.163:46300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:59:02.266849 sshd[4991]: Accepted publickey for core from 147.75.109.163 port 46300 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:59:02.321666 kernel: audit: type=1101 audit(1747443542.265:1402): pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:02.326863 kernel: audit: type=1103 audit(1747443542.271:1403): pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:02.330059 kernel: audit: type=1006 audit(1747443542.271:1404): pid=4991 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:59:02.330108 kernel: audit: type=1300 audit(1747443542.271:1404): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3a755670 a2=3 a3=0 items=0 ppid=1 pid=4991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:59:02.335664 kernel: audit: type=1327 audit(1747443542.271:1404): proctitle=737368643A20636F7265205B707269765D May 17 00:59:02.265000 audit[4991]: USER_ACCT pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:02.271000 audit[4991]: CRED_ACQ pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:02.271000 audit[4991]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3a755670 a2=3 a3=0 items=0 ppid=1 pid=4991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:59:02.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:59:02.281644 sshd[4991]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:59:02.417242 systemd-logind[1241]: New session 11 of user core. May 17 00:59:02.427803 systemd[1]: Started session-11.scope. May 17 00:59:02.443054 kernel: audit: type=1105 audit(1747443542.430:1405): pid=4991 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:02.443123 kernel: audit: type=1103 audit(1747443542.435:1406): pid=4993 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:02.430000 audit[4991]: USER_START pid=4991 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:02.435000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:08.256000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:08.404227 kernel: audit: type=1400 audit(1747443548.256:1407): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:08.416116 kernel: audit: type=1400 audit(1747443548.256:1408): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:08.416175 kernel: audit: type=1300 audit(1747443548.256:1407): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002579960 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:59:08.419154 kernel: audit: type=1327 audit(1747443548.256:1407): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:59:08.421490 kernel: audit: type=1300 audit(1747443548.256:1408): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002380810 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:59:08.421521 kernel: audit: type=1327 audit(1747443548.256:1408): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:59:08.256000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:08.256000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002579960 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:59:08.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:59:08.256000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002380810 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:59:08.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:59:08.980000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:08.980000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8f a1=c009d52870 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:59:09.020868 kernel: audit: type=1400 audit(1747443548.980:1409): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:09.034270 kernel: audit: type=1300 audit(1747443548.980:1409): arch=c000003e syscall=254 success=no exit=-13 a0=8f a1=c009d52870 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:59:09.034317 kernel: audit: type=1327 audit(1747443548.980:1409): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:59:09.034344 kernel: audit: type=1400 audit(1747443548.990:1410): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:08.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:59:08.990000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:08.990000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8e a1=c004a6fc60 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:59:08.990000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:59:09.057000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:09.057000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8e a1=c004a6fcc0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:59:09.057000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:59:09.057000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:09.057000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8e a1=c009ccf7a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:59:09.057000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:59:09.065000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:09.065000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8e a1=c009ccf7d0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:59:09.065000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:59:09.089000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:09.089000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8e a1=c009d528a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 00:59:09.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 00:59:12.970000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:12.970000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000e0d940 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:59:12.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:59:12.996000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:12.996000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002579ca0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:59:12.996000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:59:12.996000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:12.996000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002579cc0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:59:12.996000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:59:13.045000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:59:13.045000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e0da00 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 00:59:13.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:59:14.160701 kubelet[2102]: W0517 00:59:00.868083 2102 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding May 17 00:59:16.591404 kernel: kauditd_printk_skb: 26 callbacks suppressed May 17 00:59:16.690389 kernel: audit: type=1400 audit(1747443556.589:1419): avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 00:59:16.699740 kernel: audit: type=1300 audit(1747443556.589:1419): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a0a640 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 00:59:16.699790 kernel: audit: type=1327 audit(1747443556.589:1419): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:59:16.589000 audit[4480]: AVC avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 00:59:16.742328 kernel: audit: type=1400 audit(1747443556.702:1420): avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 00:59:16.742424 kernel: audit: type=1300 audit(1747443556.702:1420): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00277ff00 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 00:59:16.742448 kernel: audit: type=1327 audit(1747443556.702:1420): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:59:16.589000 audit[4480]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a0a640 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 00:59:16.589000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:59:16.702000 audit[4201]: AVC avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 00:59:16.702000 audit[4201]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00277ff00 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 00:59:16.702000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:59:34.535227 sshd[4991]: pam_unix(sshd:session): session closed for user core May 17 00:59:34.762871 kernel: audit: type=1106 audit(1747443574.653:1421): pid=4991 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:34.771716 kernel: audit: type=1104 audit(1747443574.656:1422): pid=4991 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:34.771753 kernel: audit: type=1131 audit(1747443574.720:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.101:22-147.75.109.163:46300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:59:34.653000 audit[4991]: USER_END pid=4991 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:34.656000 audit[4991]: CRED_DISP pid=4991 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:34.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.101:22-147.75.109.163:46300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:59:34.709423 systemd[1]: sshd@8-139.178.70.101:22-147.75.109.163:46300.service: Deactivated successfully. May 17 00:59:34.727114 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:59:34.727206 systemd[1]: session-11.scope: Consumed 2.967s CPU time. May 17 00:59:34.731206 systemd-logind[1241]: Session 11 logged out. Waiting for processes to exit. May 17 00:59:34.757272 systemd-logind[1241]: Removed session 11. May 17 00:59:36.161945 kubelet[2102]: E0517 00:59:36.013980 2102 controller.go:195] "Failed to update lease" err="Put \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" May 17 00:59:36.693245 env[1272]: time="2025-05-17T00:59:36.693010474Z" level=info msg="StopPodSandbox for \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\"" May 17 00:59:36.726274 systemd[1]: run-containerd-runc-k8s.io-e9f04112107ba9f811d73508665bd4bcb2e773f92692a449c401c77d3e29a7ba-runc.V3q4YM.mount: Deactivated successfully. May 17 00:59:37.360002 systemd[1]: run-containerd-runc-k8s.io-ff9096cb719433a1e4c32892f390c6cb1fd0e5915a4af5c1e291b92131288e19-runc.rJ9GpJ.mount: Deactivated successfully. May 17 00:59:39.713063 systemd[1]: Started sshd@9-139.178.70.101:22-147.75.109.163:36344.service. May 17 00:59:39.875869 kernel: audit: type=1130 audit(1747443579.719:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.101:22-147.75.109.163:36344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:59:39.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.101:22-147.75.109.163:36344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:59:40.287000 audit[5091]: USER_ACCT pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:40.350550 kernel: audit: type=1101 audit(1747443580.287:1425): pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:40.350638 kernel: audit: type=1103 audit(1747443580.293:1426): pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:40.350663 kernel: audit: type=1006 audit(1747443580.293:1427): pid=5091 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 00:59:40.350681 kernel: audit: type=1300 audit(1747443580.293:1427): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0e44ecb0 a2=3 a3=0 items=0 ppid=1 pid=5091 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:59:40.355460 kernel: audit: type=1327 audit(1747443580.293:1427): proctitle=737368643A20636F7265205B707269765D May 17 00:59:40.293000 audit[5091]: CRED_ACQ pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:40.293000 audit[5091]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0e44ecb0 a2=3 a3=0 items=0 ppid=1 pid=5091 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:59:40.293000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:59:40.445667 sshd[5091]: Accepted publickey for core from 147.75.109.163 port 36344 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 00:59:40.318144 sshd[5091]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:59:40.579576 systemd-logind[1241]: New session 12 of user core. May 17 00:59:40.593257 systemd[1]: Started session-12.scope. May 17 00:59:40.626412 kernel: audit: type=1105 audit(1747443580.614:1428): pid=5091 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:40.614000 audit[5091]: USER_START pid=5091 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:40.656313 kernel: audit: type=1103 audit(1747443580.650:1429): pid=5093 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:40.650000 audit[5093]: CRED_ACQ pid=5093 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:41.817 [WARNING][5079] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"875b9cdb-b513-48de-839e-dca19733e94b", ResourceVersion:"1344", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b", Pod:"coredns-7c65d6cfc9-9pqww", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4daab8ca7ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:41.912 [INFO][5079] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:41.914 [INFO][5079] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" iface="eth0" netns="" May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:41.917 [INFO][5079] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:41.917 [INFO][5079] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:43.057 [INFO][5100] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:43.071 [INFO][5100] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:43.073 [INFO][5100] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:43.256 [WARNING][5100] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:43.257 [INFO][5100] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:43.259 [INFO][5100] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:59:43.334942 env[1272]: 2025-05-17 00:59:43.286 [INFO][5079] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:59:43.334942 env[1272]: time="2025-05-17T00:59:43.323519587Z" level=info msg="TearDown network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\" successfully" May 17 00:59:43.334942 env[1272]: time="2025-05-17T00:59:43.323541453Z" level=info msg="StopPodSandbox for \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\" returns successfully" May 17 00:59:54.191167 env[1272]: time="2025-05-17T00:59:54.186624354Z" level=info msg="RemovePodSandbox for \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\"" May 17 00:59:54.191167 env[1272]: time="2025-05-17T00:59:54.186655902Z" level=info msg="Forcibly stopping sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\"" May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:55.080 [WARNING][5146] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"875b9cdb-b513-48de-839e-dca19733e94b", ResourceVersion:"1344", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa4315ecc07a5c739841bff3604864681b716a60aafa5d4da7241dd2c63f1c3b", Pod:"coredns-7c65d6cfc9-9pqww", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4daab8ca7ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:55.115 [INFO][5146] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:55.117 [INFO][5146] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" iface="eth0" netns="" May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:55.117 [INFO][5146] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:55.117 [INFO][5146] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:55.844 [INFO][5171] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:55.862 [INFO][5171] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:55.863 [INFO][5171] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:56.006 [WARNING][5171] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:56.006 [INFO][5171] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" HandleID="k8s-pod-network.8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" Workload="localhost-k8s-coredns--7c65d6cfc9--9pqww-eth0" May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:56.008 [INFO][5171] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:59:56.112433 env[1272]: 2025-05-17 00:59:56.042 [INFO][5146] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e" May 17 00:59:56.112433 env[1272]: time="2025-05-17T00:59:56.103873697Z" level=info msg="TearDown network for sandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\" successfully" May 17 00:59:56.291519 env[1272]: time="2025-05-17T00:59:56.160605657Z" level=info msg="RemovePodSandbox \"8e5fa457aa923ce2fe186e9c2f5cbffb147ec989ba5c55eccfcb2fd51593a12e\" returns successfully" May 17 01:00:00.545582 env[1272]: time="2025-05-17T01:00:00.535990125Z" level=info msg="StopPodSandbox for \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\"" May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:01.852 [WARNING][5185] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0", GenerateName:"calico-apiserver-68867d4df7-", Namespace:"calico-apiserver", SelfLink:"", UID:"9fd78396-3dd9-4786-9847-c14d5b321470", ResourceVersion:"1376", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68867d4df7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72", Pod:"calico-apiserver-68867d4df7-67kdl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14f9345cc86", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:01.888 [INFO][5185] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:01.889 [INFO][5185] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" iface="eth0" netns="" May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:01.890 [INFO][5185] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:01.891 [INFO][5185] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:02.439 [INFO][5205] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:02.452 [INFO][5205] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:02.452 [INFO][5205] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:02.615 [WARNING][5205] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:02.615 [INFO][5205] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:02.646 [INFO][5205] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:00:02.690759 env[1272]: 2025-05-17 01:00:02.663 [INFO][5185] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 01:00:02.690759 env[1272]: time="2025-05-17T01:00:02.689257470Z" level=info msg="TearDown network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\" successfully" May 17 01:00:02.690759 env[1272]: time="2025-05-17T01:00:02.689303894Z" level=info msg="StopPodSandbox for \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\" returns successfully" May 17 01:00:04.840494 sshd[5091]: pam_unix(sshd:session): session closed for user core May 17 01:00:04.966710 kernel: audit: type=1106 audit(1747443604.911:1430): pid=5091 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:04.973175 kernel: audit: type=1104 audit(1747443604.916:1431): pid=5091 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:04.973232 kernel: audit: type=1131 audit(1747443604.954:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.101:22-147.75.109.163:36344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:04.911000 audit[5091]: USER_END pid=5091 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:04.916000 audit[5091]: CRED_DISP pid=5091 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:04.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.101:22-147.75.109.163:36344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:04.941653 systemd[1]: sshd@9-139.178.70.101:22-147.75.109.163:36344.service: Deactivated successfully. May 17 01:00:04.958703 systemd[1]: session-12.scope: Deactivated successfully. May 17 01:00:04.958804 systemd[1]: session-12.scope: Consumed 2.944s CPU time. May 17 01:00:04.962956 systemd-logind[1241]: Session 12 logged out. Waiting for processes to exit. May 17 01:00:04.981576 systemd-logind[1241]: Removed session 12. May 17 01:00:07.672827 env[1272]: time="2025-05-17T01:00:07.662459961Z" level=info msg="RemovePodSandbox for \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\"" May 17 01:00:07.672827 env[1272]: time="2025-05-17T01:00:07.662488064Z" level=info msg="Forcibly stopping sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\"" May 17 01:00:08.353000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:08.446191 kernel: audit: type=1400 audit(1747443608.353:1433): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:08.449599 kernel: audit: type=1300 audit(1747443608.353:1433): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00262e9f0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:08.452089 kernel: audit: type=1327 audit(1747443608.353:1433): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:08.457946 kernel: audit: type=1400 audit(1747443608.353:1434): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:08.457972 kernel: audit: type=1300 audit(1747443608.353:1434): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022b4dc0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:08.457997 kernel: audit: type=1327 audit(1747443608.353:1434): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:08.353000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00262e9f0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:08.353000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:08.353000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:08.353000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022b4dc0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:08.353000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:09.068000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:09.144950 kernel: audit: type=1400 audit(1747443609.068:1435): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:09.068000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0101bc480 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:00:09.068000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:00:09.086000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:09.086000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c005b8bbc0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:00:09.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:00:09.097000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:09.097000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00772fe30 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:00:09.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:00:09.101000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:09.101000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c006f48300 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:00:09.101000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:00:09.103000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:09.103000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00772ff50 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:00:09.103000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:00:09.121000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:09.121000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0101bc4a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:00:09.121000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:08.655 [WARNING][5248] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0", GenerateName:"calico-apiserver-68867d4df7-", Namespace:"calico-apiserver", SelfLink:"", UID:"9fd78396-3dd9-4786-9847-c14d5b321470", ResourceVersion:"1376", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68867d4df7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b568ff77cc2b34dca77882e60c5728f7d867ba6d358480cfc7f70fefef906c72", Pod:"calico-apiserver-68867d4df7-67kdl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14f9345cc86", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:08.685 [INFO][5248] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:08.685 [INFO][5248] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" iface="eth0" netns="" May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:08.686 [INFO][5248] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:08.686 [INFO][5248] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:09.451 [INFO][5255] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:09.475 [INFO][5255] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:09.478 [INFO][5255] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:09.595 [WARNING][5255] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:09.595 [INFO][5255] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" HandleID="k8s-pod-network.515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" Workload="localhost-k8s-calico--apiserver--68867d4df7--67kdl-eth0" May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:09.596 [INFO][5255] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:00:09.656865 env[1272]: 2025-05-17 01:00:09.624 [INFO][5248] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1" May 17 01:00:09.656865 env[1272]: time="2025-05-17T01:00:09.656768444Z" level=info msg="TearDown network for sandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\" successfully" May 17 01:00:09.778240 env[1272]: time="2025-05-17T01:00:09.702204545Z" level=info msg="RemovePodSandbox \"515c784ae6b5487515d6c58eb30007d19f1796fdc693c44c6cc2bdfd1636f9b1\" returns successfully" May 17 01:00:09.890615 systemd[1]: Started sshd@10-139.178.70.101:22-147.75.109.163:43490.service. May 17 01:00:09.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.101:22-147.75.109.163:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:10.168916 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 01:00:10.174043 kernel: audit: type=1101 audit(1747443610.162:1442): pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:10.176524 kernel: audit: type=1103 audit(1747443610.166:1443): pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:10.176567 kernel: audit: type=1006 audit(1747443610.166:1444): pid=5262 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 01:00:10.177833 kernel: audit: type=1300 audit(1747443610.166:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff81543aa0 a2=3 a3=0 items=0 ppid=1 pid=5262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:10.180680 kernel: audit: type=1327 audit(1747443610.166:1444): proctitle=737368643A20636F7265205B707269765D May 17 01:00:10.162000 audit[5262]: USER_ACCT pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:10.166000 audit[5262]: CRED_ACQ pid=5262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:10.166000 audit[5262]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff81543aa0 a2=3 a3=0 items=0 ppid=1 pid=5262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:10.166000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:00:10.207554 sshd[5262]: Accepted publickey for core from 147.75.109.163 port 43490 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:00:10.177320 sshd[5262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:00:10.252285 systemd-logind[1241]: New session 13 of user core. May 17 01:00:10.254448 systemd[1]: Started session-13.scope. May 17 01:00:10.258000 audit[5262]: USER_START pid=5262 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:10.267172 kernel: audit: type=1105 audit(1747443610.258:1445): pid=5262 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:10.267227 kernel: audit: type=1103 audit(1747443610.262:1446): pid=5264 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:10.262000 audit[5264]: CRED_ACQ pid=5264 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:13.024836 env[1272]: time="2025-05-17T01:00:13.024595309Z" level=info msg="StopPodSandbox for \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\"" May 17 01:00:13.215591 kernel: audit: type=1400 audit(1747443613.187:1447): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:13.221979 kernel: audit: type=1300 audit(1747443613.187:1447): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027e85c0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:13.223970 kernel: audit: type=1327 audit(1747443613.187:1447): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:13.187000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:13.187000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027e85c0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:13.187000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:13.202000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:13.202000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022b5100 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:13.202000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:13.231000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:13.231000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0022b5120 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:13.231000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:13.231000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:00:13.231000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c0022b5140 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:00:13.231000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:14.091 [WARNING][5282] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0", GenerateName:"calico-kube-controllers-5759b4fc68-", Namespace:"calico-system", SelfLink:"", UID:"a96f418b-1185-4aa2-85fc-983c990d5025", ResourceVersion:"1343", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5759b4fc68", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce", Pod:"calico-kube-controllers-5759b4fc68-kk5rr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali30f12453227", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:14.112 [INFO][5282] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:14.113 [INFO][5282] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" iface="eth0" netns="" May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:14.113 [INFO][5282] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:14.113 [INFO][5282] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:14.678 [INFO][5291] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:14.710 [INFO][5291] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:14.714 [INFO][5291] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:15.274 [WARNING][5291] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:15.295 [INFO][5291] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:15.355 [INFO][5291] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:00:15.460431 env[1272]: 2025-05-17 01:00:15.427 [INFO][5282] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 01:00:15.460431 env[1272]: time="2025-05-17T01:00:15.456104684Z" level=info msg="TearDown network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\" successfully" May 17 01:00:15.460431 env[1272]: time="2025-05-17T01:00:15.456141895Z" level=info msg="StopPodSandbox for \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\" returns successfully" May 17 01:00:16.671000 audit[4480]: AVC avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 01:00:16.841843 kernel: kauditd_printk_skb: 9 callbacks suppressed May 17 01:00:16.861152 kernel: audit: type=1400 audit(1747443616.671:1451): avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 01:00:16.868541 kernel: audit: type=1300 audit(1747443616.671:1451): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00255e280 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 01:00:16.870264 kernel: audit: type=1327 audit(1747443616.671:1451): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:00:16.870296 kernel: audit: type=1400 audit(1747443616.704:1452): avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 01:00:16.870322 kernel: audit: type=1300 audit(1747443616.704:1452): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002192060 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 01:00:16.870347 kernel: audit: type=1327 audit(1747443616.704:1452): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:00:16.671000 audit[4480]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00255e280 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 01:00:16.671000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:00:16.704000 audit[4201]: AVC avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 01:00:16.704000 audit[4201]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002192060 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 01:00:16.704000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:00:27.422385 kubelet[2102]: E0517 01:00:27.119608 2102 kubelet_node_status.go:535] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"NetworkUnavailable\\\"},{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2025-05-17T00:59:36Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-05-17T00:59:36Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-05-17T00:59:36Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-05-17T00:59:36Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012\\\",\\\"ghcr.io/flatcar/calico/node:v3.30.0\\\"],\\\"sizeBytes\\\":156396234},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df\\\",\\\"ghcr.io/flatcar/calico/cni:v3.30.0\\\"],\\\"sizeBytes\\\":71793271},{\\\"names\\\":[\\\"registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a\\\",\\\"registry.k8s.io/etcd:3.5.15-0\\\"],\\\"sizeBytes\\\":56909194},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182\\\",\\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\\\"],\\\"sizeBytes\\\":52671183},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4\\\",\\\"ghcr.io/flatcar/calico/apiserver:v3.30.0\\\"],\\\"sizeBytes\\\":48745150},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f\\\",\\\"ghcr.io/flatcar/calico/typha:v3.30.0\\\"],\\\"sizeBytes\\\":35158523},{\\\"names\\\":[\\\"registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1\\\",\\\"registry.k8s.io/kube-proxy:v1.31.9\\\"],\\\"sizeBytes\\\":30354642},{\\\"names\\\":[\\\"registry.k8s.io/kube-apiserver@sha256:5b68f0df22013422dc8fb9ddfcff513eb6fc92f9dbf8aae41555c895efef5a20\\\",\\\"registry.k8s.io/kube-apiserver:v1.31.9\\\"],\\\"sizeBytes\\\":28075645},{\\\"names\\\":[\\\"registry.k8s.io/kube-controller-manager@sha256:be9e7987d323b38a12e28436cff6d6ec6fc31ffdd3ea11eaa9d74852e9d31248\\\",\\\"registry.k8s.io/kube-controller-manager:v1.31.9\\\"],\\\"sizeBytes\\\":26315362},{\\\"names\\\":[\\\"quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775\\\",\\\"quay.io/tigera/operator:v1.38.0\\\"],\\\"sizeBytes\\\":25051446},{\\\"names\\\":[\\\"registry.k8s.io/kube-scheduler@sha256:eb358c7346bb17ab2c639c3ff8ab76a147dec7ae609f5c0c2800233e42253ed1\\\",\\\"registry.k8s.io/kube-scheduler:v1.31.9\\\"],\\\"sizeBytes\\\":20386169},{\\\"names\\\":[\\\"registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e\\\",\\\"registry.k8s.io/coredns/coredns:v1.11.3\\\"],\\\"sizeBytes\\\":18562039},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8\\\",\\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\\\"],\\\"sizeBytes\\\":16198294},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd\\\",\\\"ghcr.io/flatcar/calico/csi:v3.30.0\\\"],\\\"sizeBytes\\\":10251093},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c\\\",\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\\\"],\\\"sizeBytes\\\":5934282},{\\\"names\\\":[\\\"registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a\\\",\\\"registry.k8s.io/pause:3.10\\\"],\\\"sizeBytes\\\":320368},{\\\"names\\\":[\\\"registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db\\\",\\\"registry.k8s.io/pause:3.6\\\"],\\\"sizeBytes\\\":301773}]}}\" for node \"localhost\": Patch \"https://139.178.70.101:6443/api/v1/nodes/localhost/status?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" May 17 01:00:28.125969 env[1272]: time="2025-05-17T01:00:28.125639322Z" level=info msg="RemovePodSandbox for \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\"" May 17 01:00:28.125969 env[1272]: time="2025-05-17T01:00:28.125663249Z" level=info msg="Forcibly stopping sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\"" May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:28.849 [WARNING][5311] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0", GenerateName:"calico-kube-controllers-5759b4fc68-", Namespace:"calico-system", SelfLink:"", UID:"a96f418b-1185-4aa2-85fc-983c990d5025", ResourceVersion:"1343", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5759b4fc68", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e3ed11f38743bc9956be9bd1eae7965bce6590df3442ff7307ad3fc508f9afce", Pod:"calico-kube-controllers-5759b4fc68-kk5rr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali30f12453227", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:28.874 [INFO][5311] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:28.875 [INFO][5311] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" iface="eth0" netns="" May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:28.875 [INFO][5311] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:28.875 [INFO][5311] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:29.285 [INFO][5318] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:29.295 [INFO][5318] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:29.297 [INFO][5318] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:29.421 [WARNING][5318] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:29.421 [INFO][5318] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" HandleID="k8s-pod-network.541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" Workload="localhost-k8s-calico--kube--controllers--5759b4fc68--kk5rr-eth0" May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:29.440 [INFO][5318] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:00:29.490433 env[1272]: 2025-05-17 01:00:29.462 [INFO][5311] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49" May 17 01:00:29.490433 env[1272]: time="2025-05-17T01:00:29.487340387Z" level=info msg="TearDown network for sandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\" successfully" May 17 01:00:29.644330 env[1272]: time="2025-05-17T01:00:29.509085492Z" level=info msg="RemovePodSandbox \"541eafec2dd51eb90fa8a797a6d0d645df8fa58315a11c6eec11d2c73db83b49\" returns successfully" May 17 01:00:32.262756 kubelet[2102]: E0517 01:00:32.254733 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="2m45.129s" May 17 01:00:34.574503 sshd[5262]: pam_unix(sshd:session): session closed for user core May 17 01:00:34.691794 kernel: audit: type=1106 audit(1747443634.623:1453): pid=5262 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:34.694907 kernel: audit: type=1104 audit(1747443634.628:1454): pid=5262 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:34.694936 kernel: audit: type=1131 audit(1747443634.664:1455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.101:22-147.75.109.163:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:34.623000 audit[5262]: USER_END pid=5262 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:34.628000 audit[5262]: CRED_DISP pid=5262 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:34.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.101:22-147.75.109.163:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:34.659727 systemd[1]: sshd@10-139.178.70.101:22-147.75.109.163:43490.service: Deactivated successfully. May 17 01:00:34.669033 systemd[1]: session-13.scope: Deactivated successfully. May 17 01:00:34.669119 systemd[1]: session-13.scope: Consumed 4.434s CPU time. May 17 01:00:34.670453 systemd-logind[1241]: Session 13 logged out. Waiting for processes to exit. May 17 01:00:34.682866 systemd-logind[1241]: Removed session 13. May 17 01:00:35.380443 env[1272]: time="2025-05-17T01:00:35.380405902Z" level=info msg="StopPodSandbox for \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\"" May 17 01:00:39.705400 systemd[1]: Started sshd@11-139.178.70.101:22-147.75.109.163:49290.service. May 17 01:00:39.840030 kernel: audit: type=1130 audit(1747443639.711:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.101:22-147.75.109.163:49290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:39.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.101:22-147.75.109.163:49290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:40.093000 audit[5388]: USER_ACCT pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:40.172059 kernel: audit: type=1101 audit(1747443640.093:1457): pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:40.172490 kernel: audit: type=1103 audit(1747443640.124:1458): pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:40.179434 kernel: audit: type=1006 audit(1747443640.128:1459): pid=5388 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 01:00:40.183774 kernel: audit: type=1300 audit(1747443640.128:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47bf9a70 a2=3 a3=0 items=0 ppid=1 pid=5388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:40.194283 kernel: audit: type=1327 audit(1747443640.128:1459): proctitle=737368643A20636F7265205B707269765D May 17 01:00:40.124000 audit[5388]: CRED_ACQ pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:40.128000 audit[5388]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47bf9a70 a2=3 a3=0 items=0 ppid=1 pid=5388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:40.128000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:00:40.150577 sshd[5388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:00:40.307214 sshd[5388]: Accepted publickey for core from 147.75.109.163 port 49290 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:00:40.419971 systemd-logind[1241]: New session 14 of user core. May 17 01:00:40.428869 systemd[1]: Started session-14.scope. May 17 01:00:40.474048 kernel: audit: type=1105 audit(1747443640.453:1460): pid=5388 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:40.453000 audit[5388]: USER_START pid=5388 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:40.478000 audit[5390]: CRED_ACQ pid=5390 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:40.484680 kernel: audit: type=1103 audit(1747443640.478:1461): pid=5390 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:37.540 [WARNING][5370] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tvdvr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0c4e0d50-b866-40a1-83cb-4fa0aee569d4", ResourceVersion:"1383", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5", Pod:"csi-node-driver-tvdvr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicfb7ea7220e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:37.626 [INFO][5370] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:37.628 [INFO][5370] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" iface="eth0" netns="" May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:37.629 [INFO][5370] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:37.629 [INFO][5370] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:38.958 [INFO][5380] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:38.981 [INFO][5380] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:38.985 [INFO][5380] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:39.613 [WARNING][5380] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:39.660 [INFO][5380] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:40.301 [INFO][5380] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:00:40.484719 env[1272]: 2025-05-17 01:00:40.418 [INFO][5370] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 01:00:40.484719 env[1272]: time="2025-05-17T01:00:40.470605588Z" level=info msg="TearDown network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\" successfully" May 17 01:00:40.484719 env[1272]: time="2025-05-17T01:00:40.470627523Z" level=info msg="StopPodSandbox for \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\" returns successfully" May 17 01:00:46.648792 env[1272]: time="2025-05-17T01:00:46.638429614Z" level=info msg="RemovePodSandbox for \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\"" May 17 01:00:46.648792 env[1272]: time="2025-05-17T01:00:46.638461511Z" level=info msg="Forcibly stopping sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\"" May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.426 [WARNING][5408] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tvdvr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0c4e0d50-b866-40a1-83cb-4fa0aee569d4", ResourceVersion:"1383", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 56, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75322be3280ebcfc24ee2c029978b64f64d4c756ec7f56fc93b0f034196757c5", Pod:"csi-node-driver-tvdvr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicfb7ea7220e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.436 [INFO][5408] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.437 [INFO][5408] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" iface="eth0" netns="" May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.437 [INFO][5408] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.437 [INFO][5408] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.884 [INFO][5415] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.896 [INFO][5415] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.898 [INFO][5415] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.980 [WARNING][5415] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.980 [INFO][5415] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" HandleID="k8s-pod-network.beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" Workload="localhost-k8s-csi--node--driver--tvdvr-eth0" May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.982 [INFO][5415] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:00:48.017248 env[1272]: 2025-05-17 01:00:47.995 [INFO][5408] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab" May 17 01:00:48.017248 env[1272]: time="2025-05-17T01:00:48.012206369Z" level=info msg="TearDown network for sandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\" successfully" May 17 01:00:48.139376 env[1272]: time="2025-05-17T01:00:48.026359305Z" level=info msg="RemovePodSandbox \"beb8348cf63c9dd4771d209844a6d6ba753316d1e108c75f0038248941f7e9ab\" returns successfully" May 17 01:00:51.203534 sshd[5388]: pam_unix(sshd:session): session closed for user core May 17 01:00:51.303129 kernel: audit: type=1106 audit(1747443651.250:1462): pid=5388 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:51.307668 kernel: audit: type=1104 audit(1747443651.254:1463): pid=5388 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:51.307702 kernel: audit: type=1131 audit(1747443651.288:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.101:22-147.75.109.163:49290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:51.250000 audit[5388]: USER_END pid=5388 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:51.254000 audit[5388]: CRED_DISP pid=5388 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:51.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.101:22-147.75.109.163:49290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:51.285070 systemd[1]: sshd@11-139.178.70.101:22-147.75.109.163:49290.service: Deactivated successfully. May 17 01:00:51.289814 systemd[1]: session-14.scope: Deactivated successfully. May 17 01:00:51.289922 systemd[1]: session-14.scope: Consumed 2.400s CPU time. May 17 01:00:51.293301 systemd-logind[1241]: Session 14 logged out. Waiting for processes to exit. May 17 01:00:51.304527 systemd-logind[1241]: Removed session 14. May 17 01:00:53.791000 audit[5445]: NETFILTER_CFG table=filter:131 family=2 entries=21 op=nft_register_rule pid=5445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:53.903309 kernel: audit: type=1325 audit(1747443653.791:1465): table=filter:131 family=2 entries=21 op=nft_register_rule pid=5445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:53.909042 kernel: audit: type=1300 audit(1747443653.791:1465): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff690d9040 a2=0 a3=7fff690d902c items=0 ppid=2246 pid=5445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:53.909075 kernel: audit: type=1327 audit(1747443653.791:1465): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:53.909095 kernel: audit: type=1325 audit(1747443653.801:1466): table=nat:132 family=2 entries=19 op=nft_register_chain pid=5445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:53.909109 kernel: audit: type=1300 audit(1747443653.801:1466): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff690d9040 a2=0 a3=7fff690d902c items=0 ppid=2246 pid=5445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:53.909126 kernel: audit: type=1327 audit(1747443653.801:1466): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:53.791000 audit[5445]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff690d9040 a2=0 a3=7fff690d902c items=0 ppid=2246 pid=5445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:53.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:53.801000 audit[5445]: NETFILTER_CFG table=nat:132 family=2 entries=19 op=nft_register_chain pid=5445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:53.801000 audit[5445]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff690d9040 a2=0 a3=7fff690d902c items=0 ppid=2246 pid=5445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:53.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:55.210969 env[1272]: time="2025-05-17T01:00:55.207448967Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 01:00:55.519296 env[1272]: time="2025-05-17T01:00:55.519150487Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:00:55.553872 env[1272]: time="2025-05-17T01:00:55.528223830Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:00:55.872080 kubelet[2102]: E0517 01:00:55.872024 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="3.329s" May 17 01:00:56.059123 kubelet[2102]: E0517 01:00:55.921635 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:00:56.111892 kubelet[2102]: E0517 01:00:56.109401 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:00:56.141228 env[1272]: time="2025-05-17T01:00:56.141163951Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 01:00:56.219686 systemd[1]: Started sshd@12-139.178.70.101:22-147.75.109.163:34646.service. May 17 01:00:56.264438 kernel: audit: type=1130 audit(1747443656.221:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.101:22-147.75.109.163:34646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:56.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.101:22-147.75.109.163:34646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:00:56.360271 kubelet[2102]: E0517 01:00:56.200944 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jjdfq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-ws46h_calico-system(aa6e114e-decb-446a-8bda-8dbdb7e8f8a5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:00:56.415353 env[1272]: time="2025-05-17T01:00:56.415313986Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:00:56.491557 env[1272]: time="2025-05-17T01:00:56.480052266Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:00:56.666000 audit[5487]: USER_ACCT pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:56.682684 kernel: audit: type=1101 audit(1747443656.666:1468): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:56.683744 kernel: audit: type=1103 audit(1747443656.671:1469): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:56.686562 kernel: audit: type=1006 audit(1747443656.671:1470): pid=5487 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 01:00:56.686608 kernel: audit: type=1300 audit(1747443656.671:1470): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9267a3b0 a2=3 a3=0 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:56.686629 kernel: audit: type=1327 audit(1747443656.671:1470): proctitle=737368643A20636F7265205B707269765D May 17 01:00:56.671000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:56.671000 audit[5487]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9267a3b0 a2=3 a3=0 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:56.671000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:00:56.718025 sshd[5487]: Accepted publickey for core from 147.75.109.163 port 34646 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:00:56.687082 sshd[5487]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:00:56.822032 systemd-logind[1241]: New session 15 of user core. May 17 01:00:56.859518 kernel: audit: type=1105 audit(1747443656.838:1471): pid=5487 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:56.864588 kernel: audit: type=1103 audit(1747443656.848:1472): pid=5489 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:56.838000 audit[5487]: USER_START pid=5487 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:56.848000 audit[5489]: CRED_ACQ pid=5489 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:00:56.829706 systemd[1]: Started session-15.scope. May 17 01:00:57.148000 audit[5495]: NETFILTER_CFG table=filter:133 family=2 entries=20 op=nft_register_rule pid=5495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:57.169175 kernel: audit: type=1325 audit(1747443657.148:1473): table=filter:133 family=2 entries=20 op=nft_register_rule pid=5495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:57.173122 kernel: audit: type=1300 audit(1747443657.148:1473): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc43ee6790 a2=0 a3=7ffc43ee677c items=0 ppid=2246 pid=5495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:57.174735 kernel: audit: type=1327 audit(1747443657.148:1473): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:57.148000 audit[5495]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc43ee6790 a2=0 a3=7ffc43ee677c items=0 ppid=2246 pid=5495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:57.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:57.173000 audit[5495]: NETFILTER_CFG table=nat:134 family=2 entries=26 op=nft_register_chain pid=5495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:57.173000 audit[5495]: SYSCALL arch=c000003e syscall=46 success=yes exit=8164 a0=3 a1=7ffc43ee6790 a2=0 a3=7ffc43ee677c items=0 ppid=2246 pid=5495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:57.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:58.324357 kubelet[2102]: E0517 01:00:57.444498 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:00:58.664422 kubelet[2102]: E0517 01:00:58.664390 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:00:58.816078 kubelet[2102]: E0517 01:00:58.816028 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 01:00:59.235783 kubelet[2102]: E0517 01:00:59.235681 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f3220a9cd9124e429d43096f605c6b7f,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-dqhvx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7978b49988-n5v9k_calico-system(818ef22a-f243-4e76-9a56-f361deab60e5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:00:59.313749 env[1272]: time="2025-05-17T01:00:59.313639584Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 01:00:59.587290 env[1272]: time="2025-05-17T01:00:59.587155873Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:00:59.594004 env[1272]: time="2025-05-17T01:00:59.593913880Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:00:59.816000 audit[5500]: NETFILTER_CFG table=filter:135 family=2 entries=17 op=nft_register_rule pid=5500 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:59.816000 audit[5500]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd13098720 a2=0 a3=7ffd1309870c items=0 ppid=2246 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:59.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:59.821000 audit[5500]: NETFILTER_CFG table=nat:136 family=2 entries=47 op=nft_register_chain pid=5500 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:59.821000 audit[5500]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd13098720 a2=0 a3=7ffd1309870c items=0 ppid=2246 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:59.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:59.865000 audit[5503]: NETFILTER_CFG table=filter:137 family=2 entries=14 op=nft_register_rule pid=5503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:59.865000 audit[5503]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcee396cb0 a2=0 a3=7ffcee396c9c items=0 ppid=2246 pid=5503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:59.865000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:59.871000 audit[5503]: NETFILTER_CFG table=nat:138 family=2 entries=20 op=nft_register_rule pid=5503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:00:59.871000 audit[5503]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcee396cb0 a2=0 a3=7ffcee396c9c items=0 ppid=2246 pid=5503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:00:59.871000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:00:59.883535 kubelet[2102]: E0517 01:00:59.875099 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:00:59.946734 kubelet[2102]: E0517 01:00:59.946710 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:01:00.053039 kubelet[2102]: E0517 01:01:00.052996 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-dqhvx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7978b49988-n5v9k_calico-system(818ef22a-f243-4e76-9a56-f361deab60e5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:01:00.255385 kubelet[2102]: E0517 01:01:00.199522 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7978b49988-n5v9k" podUID="818ef22a-f243-4e76-9a56-f361deab60e5" May 17 01:01:00.915000 audit[5505]: NETFILTER_CFG table=filter:139 family=2 entries=13 op=nft_register_rule pid=5505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:01:00.915000 audit[5505]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd3c8f4410 a2=0 a3=7ffd3c8f43fc items=0 ppid=2246 pid=5505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:00.915000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:01:00.921000 audit[5505]: NETFILTER_CFG table=nat:140 family=2 entries=27 op=nft_register_chain pid=5505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:01:00.921000 audit[5505]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd3c8f4410 a2=0 a3=7ffd3c8f43fc items=0 ppid=2246 pid=5505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:00.921000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:01:01.361700 sshd[5487]: pam_unix(sshd:session): session closed for user core May 17 01:01:01.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.101:22-147.75.109.163:36058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:01.403000 audit[5487]: USER_END pid=5487 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.405000 audit[5487]: CRED_DISP pid=5487 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.101:22-147.75.109.163:34646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:01.401693 systemd[1]: Started sshd@13-139.178.70.101:22-147.75.109.163:36058.service. May 17 01:01:01.413828 systemd[1]: sshd@12-139.178.70.101:22-147.75.109.163:34646.service: Deactivated successfully. May 17 01:01:01.414322 systemd[1]: session-15.scope: Deactivated successfully. May 17 01:01:01.414947 systemd-logind[1241]: Session 15 logged out. Waiting for processes to exit. May 17 01:01:01.415455 systemd-logind[1241]: Removed session 15. May 17 01:01:01.481000 audit[5507]: USER_ACCT pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.482000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.482000 audit[5507]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8e7c17e0 a2=3 a3=0 items=0 ppid=1 pid=5507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:01.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:01:01.495701 sshd[5507]: Accepted publickey for core from 147.75.109.163 port 36058 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:01:01.488122 sshd[5507]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:01:01.515915 systemd[1]: Started session-16.scope. May 17 01:01:01.516007 systemd-logind[1241]: New session 16 of user core. May 17 01:01:01.518000 audit[5507]: USER_START pid=5507 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.519000 audit[5511]: CRED_ACQ pid=5511 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.904903 sshd[5507]: pam_unix(sshd:session): session closed for user core May 17 01:01:01.913191 kernel: kauditd_printk_skb: 32 callbacks suppressed May 17 01:01:01.924202 kernel: audit: type=1106 audit(1747443661.905:1490): pid=5507 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.924246 kernel: audit: type=1104 audit(1747443661.905:1491): pid=5507 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.924265 kernel: audit: type=1131 audit(1747443661.911:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.101:22-147.75.109.163:36058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:01.924283 kernel: audit: type=1130 audit(1747443661.913:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.101:22-147.75.109.163:36060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:01.905000 audit[5507]: USER_END pid=5507 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.905000 audit[5507]: CRED_DISP pid=5507 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.101:22-147.75.109.163:36058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:01.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.101:22-147.75.109.163:36060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:01.912301 systemd[1]: sshd@13-139.178.70.101:22-147.75.109.163:36058.service: Deactivated successfully. May 17 01:01:01.912706 systemd[1]: session-16.scope: Deactivated successfully. May 17 01:01:01.915651 systemd[1]: Started sshd@14-139.178.70.101:22-147.75.109.163:36060.service. May 17 01:01:01.916996 systemd-logind[1241]: Session 16 logged out. Waiting for processes to exit. May 17 01:01:01.920653 systemd-logind[1241]: Removed session 16. May 17 01:01:01.967224 sshd[5519]: Accepted publickey for core from 147.75.109.163 port 36060 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:01:01.966000 audit[5519]: USER_ACCT pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.970897 kernel: audit: type=1101 audit(1747443661.966:1494): pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.971214 sshd[5519]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:01:01.970000 audit[5519]: CRED_ACQ pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.974896 kernel: audit: type=1103 audit(1747443661.970:1495): pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.970000 audit[5519]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf0670f00 a2=3 a3=0 items=0 ppid=1 pid=5519 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:01.982169 kernel: audit: type=1006 audit(1747443661.970:1496): pid=5519 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 01:01:01.982209 kernel: audit: type=1300 audit(1747443661.970:1496): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf0670f00 a2=3 a3=0 items=0 ppid=1 pid=5519 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:01.970000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:01:01.984960 kernel: audit: type=1327 audit(1747443661.970:1496): proctitle=737368643A20636F7265205B707269765D May 17 01:01:01.985916 systemd[1]: Started session-17.scope. May 17 01:01:01.986526 systemd-logind[1241]: New session 17 of user core. May 17 01:01:01.989000 audit[5519]: USER_START pid=5519 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.994893 kernel: audit: type=1105 audit(1747443661.989:1497): pid=5519 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:01.990000 audit[5521]: CRED_ACQ pid=5521 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:02.489409 sshd[5519]: pam_unix(sshd:session): session closed for user core May 17 01:01:02.490000 audit[5519]: USER_END pid=5519 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:02.491000 audit[5519]: CRED_DISP pid=5519 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:02.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.101:22-147.75.109.163:36060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:02.495169 systemd[1]: sshd@14-139.178.70.101:22-147.75.109.163:36060.service: Deactivated successfully. May 17 01:01:02.497518 systemd[1]: session-17.scope: Deactivated successfully. May 17 01:01:02.498530 systemd-logind[1241]: Session 17 logged out. Waiting for processes to exit. May 17 01:01:02.499129 systemd-logind[1241]: Removed session 17. May 17 01:01:07.528675 systemd[1]: Started sshd@15-139.178.70.101:22-147.75.109.163:36074.service. May 17 01:01:07.566512 kernel: kauditd_printk_skb: 4 callbacks suppressed May 17 01:01:07.571683 kernel: audit: type=1130 audit(1747443667.527:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.101:22-147.75.109.163:36074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:07.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.101:22-147.75.109.163:36074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:07.663000 audit[5531]: USER_ACCT pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:07.681132 kernel: audit: type=1101 audit(1747443667.663:1503): pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:07.681185 kernel: audit: type=1103 audit(1747443667.667:1504): pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:07.681211 kernel: audit: type=1006 audit(1747443667.667:1505): pid=5531 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 17 01:01:07.681230 kernel: audit: type=1300 audit(1747443667.667:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a5a35b0 a2=3 a3=0 items=0 ppid=1 pid=5531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:07.681245 kernel: audit: type=1327 audit(1747443667.667:1505): proctitle=737368643A20636F7265205B707269765D May 17 01:01:07.667000 audit[5531]: CRED_ACQ pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:07.667000 audit[5531]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a5a35b0 a2=3 a3=0 items=0 ppid=1 pid=5531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:07.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:01:07.696634 sshd[5531]: Accepted publickey for core from 147.75.109.163 port 36074 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:01:07.678703 sshd[5531]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:01:07.707224 systemd-logind[1241]: New session 18 of user core. May 17 01:01:07.708318 systemd[1]: Started session-18.scope. May 17 01:01:07.712000 audit[5531]: USER_START pid=5531 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:07.717998 kernel: audit: type=1105 audit(1747443667.712:1506): pid=5531 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:07.718000 audit[5533]: CRED_ACQ pid=5533 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:07.721920 kernel: audit: type=1103 audit(1747443667.718:1507): pid=5533 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.333326 sshd[5531]: pam_unix(sshd:session): session closed for user core May 17 01:01:08.344499 kernel: audit: type=1130 audit(1747443668.335:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.101:22-147.75.109.163:49770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:08.345355 kernel: audit: type=1106 audit(1747443668.339:1509): pid=5531 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.101:22-147.75.109.163:49770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:08.339000 audit[5531]: USER_END pid=5531 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.344000 audit[5531]: CRED_DISP pid=5531 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.101:22-147.75.109.163:36074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:08.333972 systemd[1]: Started sshd@16-139.178.70.101:22-147.75.109.163:49770.service. May 17 01:01:08.350475 systemd[1]: sshd@15-139.178.70.101:22-147.75.109.163:36074.service: Deactivated successfully. May 17 01:01:08.351032 systemd[1]: session-18.scope: Deactivated successfully. May 17 01:01:08.351855 systemd-logind[1241]: Session 18 logged out. Waiting for processes to exit. May 17 01:01:08.352401 systemd-logind[1241]: Removed session 18. May 17 01:01:08.391000 audit[5541]: USER_ACCT pid=5541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.392000 audit[5541]: CRED_ACQ pid=5541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.392000 audit[5541]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8edcab90 a2=3 a3=0 items=0 ppid=1 pid=5541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:08.392000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:01:08.394588 sshd[5541]: Accepted publickey for core from 147.75.109.163 port 49770 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:01:08.395335 sshd[5541]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:01:08.400227 systemd[1]: Started session-19.scope. May 17 01:01:08.401170 systemd-logind[1241]: New session 19 of user core. May 17 01:01:08.403000 audit[5541]: USER_START pid=5541 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.404000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.432000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:08.432000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002578e00 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:08.432000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:08.432000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:08.432000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00143af00 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:08.432000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:08.981774 sshd[5541]: pam_unix(sshd:session): session closed for user core May 17 01:01:08.988079 systemd[1]: Started sshd@17-139.178.70.101:22-147.75.109.163:49784.service. May 17 01:01:08.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.101:22-147.75.109.163:49784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:08.988000 audit[5541]: USER_END pid=5541 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.988000 audit[5541]: CRED_DISP pid=5541 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:08.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.101:22-147.75.109.163:49770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:08.990823 systemd[1]: sshd@16-139.178.70.101:22-147.75.109.163:49770.service: Deactivated successfully. May 17 01:01:08.991437 systemd[1]: session-19.scope: Deactivated successfully. May 17 01:01:08.992638 systemd-logind[1241]: Session 19 logged out. Waiting for processes to exit. May 17 01:01:08.993265 systemd-logind[1241]: Removed session 19. May 17 01:01:09.074000 audit[5551]: USER_ACCT pid=5551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:09.075954 sshd[5551]: Accepted publickey for core from 147.75.109.163 port 49784 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:01:09.075000 audit[5551]: CRED_ACQ pid=5551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:09.076000 audit[5551]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff488a7fd0 a2=3 a3=0 items=0 ppid=1 pid=5551 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:09.076000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:01:09.077915 sshd[5551]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:01:09.081543 systemd-logind[1241]: New session 20 of user core. May 17 01:01:09.082199 systemd[1]: Started session-20.scope. May 17 01:01:09.085000 audit[5551]: USER_START pid=5551 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:09.086000 audit[5554]: CRED_ACQ pid=5554 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:09.106000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:09.106000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0073b17a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:01:09.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:01:09.106000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:09.106000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009e2e7e0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:01:09.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:01:09.121000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:09.121000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0089b8600 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:01:09.121000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:01:09.121000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:09.121000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0089b8620 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:01:09.121000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:01:09.122000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:09.122000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c009e2e8a0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:01:09.122000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:01:09.133000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:09.133000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c007ffc6c0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:01:09.133000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:01:13.359194 kernel: kauditd_printk_skb: 44 callbacks suppressed May 17 01:01:13.494555 kernel: audit: type=1400 audit(1747443673.341:1534): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:13.507717 kernel: audit: type=1300 audit(1747443673.341:1534): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0009b5180 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:13.513462 kernel: audit: type=1327 audit(1747443673.341:1534): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:13.516410 kernel: audit: type=1400 audit(1747443673.362:1535): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:13.519595 kernel: audit: type=1300 audit(1747443673.362:1535): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009b51a0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:13.519753 kernel: audit: type=1327 audit(1747443673.362:1535): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:13.521754 kernel: audit: type=1400 audit(1747443673.385:1536): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:13.521780 kernel: audit: type=1300 audit(1747443673.385:1536): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009b51c0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:13.524085 kernel: audit: type=1327 audit(1747443673.385:1536): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:13.524123 kernel: audit: type=1400 audit(1747443673.399:1537): avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:13.341000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:13.341000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0009b5180 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:13.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:13.362000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:13.362000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009b51a0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:13.362000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:13.385000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:13.385000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009b51c0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:13.385000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:13.399000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:13.399000 audit[1937]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0025790a0 a2=fc6 a3=0 items=0 ppid=1795 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:13.399000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:16.867000 audit[4480]: AVC avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 01:01:16.867000 audit[4480]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001b7f620 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 01:01:16.867000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:01:16.867000 audit[4201]: AVC avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 01:01:16.867000 audit[4201]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002193bc0 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 01:01:16.867000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:01:31.617045 systemd[1]: cri-containerd-bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193.scope: Deactivated successfully. May 17 01:01:31.766230 kernel: kauditd_printk_skb: 8 callbacks suppressed May 17 01:01:31.798090 kernel: audit: type=1334 audit(1747443691.627:1540): prog-id=76 op=UNLOAD May 17 01:01:31.801915 kernel: audit: type=1334 audit(1747443691.627:1541): prog-id=95 op=UNLOAD May 17 01:01:31.627000 audit: BPF prog-id=76 op=UNLOAD May 17 01:01:31.627000 audit: BPF prog-id=95 op=UNLOAD May 17 01:01:31.845615 env[1272]: time="2025-05-17T01:01:31.696048634Z" level=info msg="shim disconnected" id=bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193 May 17 01:01:31.845615 env[1272]: time="2025-05-17T01:01:31.696082575Z" level=warning msg="cleaning up after shim disconnected" id=bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193 namespace=k8s.io May 17 01:01:31.845615 env[1272]: time="2025-05-17T01:01:31.696089525Z" level=info msg="cleaning up dead shim" May 17 01:01:31.845615 env[1272]: time="2025-05-17T01:01:31.715075766Z" level=warning msg="cleanup warnings time=\"2025-05-17T01:01:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5604 runtime=io.containerd.runc.v2\n" May 17 01:01:31.623639 systemd[1]: cri-containerd-bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193.scope: Consumed 3.974s CPU time. May 17 01:01:31.743194 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193-rootfs.mount: Deactivated successfully. May 17 01:01:31.969822 systemd[1]: cri-containerd-0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72.scope: Deactivated successfully. May 17 01:01:31.973374 kernel: audit: type=1334 audit(1747443691.969:1542): prog-id=117 op=UNLOAD May 17 01:01:31.969000 audit: BPF prog-id=117 op=UNLOAD May 17 01:01:31.970018 systemd[1]: cri-containerd-0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72.scope: Consumed 21.895s CPU time. May 17 01:01:32.007110 kernel: audit: type=1334 audit(1747443692.005:1543): prog-id=120 op=UNLOAD May 17 01:01:32.005000 audit: BPF prog-id=120 op=UNLOAD May 17 01:01:32.024998 env[1272]: time="2025-05-17T01:01:32.024937686Z" level=info msg="shim disconnected" id=0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72 May 17 01:01:32.025084 env[1272]: time="2025-05-17T01:01:32.024997852Z" level=warning msg="cleaning up after shim disconnected" id=0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72 namespace=k8s.io May 17 01:01:32.025084 env[1272]: time="2025-05-17T01:01:32.025004484Z" level=info msg="cleaning up dead shim" May 17 01:01:32.028838 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72-rootfs.mount: Deactivated successfully. May 17 01:01:32.033265 env[1272]: time="2025-05-17T01:01:32.033214108Z" level=warning msg="cleanup warnings time=\"2025-05-17T01:01:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5630 runtime=io.containerd.runc.v2\n" May 17 01:01:32.321732 systemd[1]: cri-containerd-bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d.scope: Deactivated successfully. May 17 01:01:32.327988 kernel: audit: type=1334 audit(1747443692.325:1544): prog-id=84 op=UNLOAD May 17 01:01:32.329588 kernel: audit: type=1334 audit(1747443692.325:1545): prog-id=93 op=UNLOAD May 17 01:01:32.325000 audit: BPF prog-id=84 op=UNLOAD May 17 01:01:32.325000 audit: BPF prog-id=93 op=UNLOAD May 17 01:01:32.321877 systemd[1]: cri-containerd-bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d.scope: Consumed 1.986s CPU time. May 17 01:01:32.350818 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d-rootfs.mount: Deactivated successfully. May 17 01:01:32.353219 env[1272]: time="2025-05-17T01:01:32.352345615Z" level=info msg="shim disconnected" id=bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d May 17 01:01:32.353219 env[1272]: time="2025-05-17T01:01:32.352371082Z" level=warning msg="cleaning up after shim disconnected" id=bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d namespace=k8s.io May 17 01:01:32.353219 env[1272]: time="2025-05-17T01:01:32.352385630Z" level=info msg="cleaning up dead shim" May 17 01:01:32.362188 env[1272]: time="2025-05-17T01:01:32.362155755Z" level=warning msg="cleanup warnings time=\"2025-05-17T01:01:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5658 runtime=io.containerd.runc.v2\n" May 17 01:01:32.584010 sshd[5551]: pam_unix(sshd:session): session closed for user core May 17 01:01:32.609736 systemd[1]: Started sshd@18-139.178.70.101:22-147.75.109.163:54424.service. May 17 01:01:32.624818 kernel: audit: type=1130 audit(1747443692.612:1546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.101:22-147.75.109.163:54424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:32.624859 kernel: audit: type=1106 audit(1747443692.620:1547): pid=5551 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:32.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.101:22-147.75.109.163:54424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:32.633064 kernel: audit: type=1104 audit(1747443692.623:1548): pid=5551 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:32.620000 audit[5551]: USER_END pid=5551 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:32.636905 kernel: audit: type=1131 audit(1747443692.632:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.101:22-147.75.109.163:49784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:32.623000 audit[5551]: CRED_DISP pid=5551 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:32.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.101:22-147.75.109.163:49784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:32.633259 systemd[1]: sshd@17-139.178.70.101:22-147.75.109.163:49784.service: Deactivated successfully. May 17 01:01:32.633774 systemd[1]: session-20.scope: Deactivated successfully. May 17 01:01:32.634347 systemd-logind[1241]: Session 20 logged out. Waiting for processes to exit. May 17 01:01:32.634876 systemd-logind[1241]: Removed session 20. May 17 01:01:32.693000 audit[5676]: NETFILTER_CFG table=filter:141 family=2 entries=24 op=nft_register_rule pid=5676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:01:32.693000 audit[5676]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe569e0150 a2=0 a3=7ffe569e013c items=0 ppid=2246 pid=5676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:32.693000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:01:32.698000 audit[5676]: NETFILTER_CFG table=nat:142 family=2 entries=22 op=nft_register_rule pid=5676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:01:32.698000 audit[5676]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe569e0150 a2=0 a3=0 items=0 ppid=2246 pid=5676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:32.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:01:32.731000 audit[5672]: USER_ACCT pid=5672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:32.731000 audit[5672]: CRED_ACQ pid=5672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:32.732000 audit[5672]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95302c00 a2=3 a3=0 items=0 ppid=1 pid=5672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:32.732000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:01:32.736188 sshd[5672]: Accepted publickey for core from 147.75.109.163 port 54424 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:01:32.735746 sshd[5672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:01:32.759567 systemd-logind[1241]: New session 21 of user core. May 17 01:01:32.760343 systemd[1]: Started session-21.scope. May 17 01:01:32.763000 audit[5672]: USER_START pid=5672 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:32.764000 audit[5677]: CRED_ACQ pid=5677 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:33.530040 systemd[1]: run-containerd-runc-k8s.io-ff9096cb719433a1e4c32892f390c6cb1fd0e5915a4af5c1e291b92131288e19-runc.jZY20Q.mount: Deactivated successfully. May 17 01:01:34.090805 kubelet[2102]: E0517 01:01:34.089708 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="23.123s" May 17 01:01:34.173093 kubelet[2102]: I0517 01:01:34.173068 2102 scope.go:117] "RemoveContainer" containerID="bc302bb3562d60f51314f95b5380c78a5bd6e0fc398275dd7299a1d6e153dd9d" May 17 01:01:34.173223 kubelet[2102]: I0517 01:01:34.173205 2102 scope.go:117] "RemoveContainer" containerID="0206dccd29a8e09c597adf77fdc6dbb82f92671cdaec5f6108932a77b91c5f72" May 17 01:01:34.175661 kubelet[2102]: I0517 01:01:34.175643 2102 scope.go:117] "RemoveContainer" containerID="bd047e93aa003d14ba9d26b871b285f2b2e308a5ccd5c4734b0097fa216f8193" May 17 01:01:34.182836 kubelet[2102]: E0517 01:01:34.182817 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 01:01:34.290817 kubelet[2102]: E0517 01:01:34.290773 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-7978b49988-n5v9k" podUID="818ef22a-f243-4e76-9a56-f361deab60e5" May 17 01:01:34.297427 env[1272]: time="2025-05-17T01:01:34.297352796Z" level=info msg="CreateContainer within sandbox \"36b160f3199ff1bff3b6a6316309a5f6886b3e1293116b25e37102863088604e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" May 17 01:01:34.304155 env[1272]: time="2025-05-17T01:01:34.304106637Z" level=info msg="CreateContainer within sandbox \"802727fa2f24ea7b3fea76766ca0f1aa2c107245d64d91c006f82fd65450dedb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" May 17 01:01:34.307993 env[1272]: time="2025-05-17T01:01:34.307908675Z" level=info msg="CreateContainer within sandbox \"6d8084947609c2f69e4717aa68c5d0ca6219827a497de5cc717327ac88fce93b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" May 17 01:01:34.368383 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3124890270.mount: Deactivated successfully. May 17 01:01:34.379348 env[1272]: time="2025-05-17T01:01:34.375444011Z" level=info msg="CreateContainer within sandbox \"802727fa2f24ea7b3fea76766ca0f1aa2c107245d64d91c006f82fd65450dedb\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"92f65348985366f92e2736dcb27c391fe2ab264f034a18913ba2463b322d4dbb\"" May 17 01:01:34.379348 env[1272]: time="2025-05-17T01:01:34.378200635Z" level=info msg="CreateContainer within sandbox \"6d8084947609c2f69e4717aa68c5d0ca6219827a497de5cc717327ac88fce93b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"9da026477b74bcaf61ee8fb4af24627781241fe82f00bdde183985bbedad978c\"" May 17 01:01:34.381836 env[1272]: time="2025-05-17T01:01:34.381819801Z" level=info msg="CreateContainer within sandbox \"36b160f3199ff1bff3b6a6316309a5f6886b3e1293116b25e37102863088604e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"c07203609bb1bf763d3fe8499de9d1eefb55d218b6011db48011007f3d0407b3\"" May 17 01:01:34.408090 env[1272]: time="2025-05-17T01:01:34.408066370Z" level=info msg="StartContainer for \"92f65348985366f92e2736dcb27c391fe2ab264f034a18913ba2463b322d4dbb\"" May 17 01:01:34.408325 env[1272]: time="2025-05-17T01:01:34.408066367Z" level=info msg="StartContainer for \"c07203609bb1bf763d3fe8499de9d1eefb55d218b6011db48011007f3d0407b3\"" May 17 01:01:34.470075 systemd[1]: Started cri-containerd-92f65348985366f92e2736dcb27c391fe2ab264f034a18913ba2463b322d4dbb.scope. May 17 01:01:34.470867 systemd[1]: Started cri-containerd-c07203609bb1bf763d3fe8499de9d1eefb55d218b6011db48011007f3d0407b3.scope. May 17 01:01:34.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.487000 audit: BPF prog-id=219 op=LOAD May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2152 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663635333438393835333636663932653237333664636232376333 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2152 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663635333438393835333636663932653237333664636232376333 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit: BPF prog-id=220 op=LOAD May 17 01:01:34.488000 audit[5741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b6390 items=0 ppid=2152 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663635333438393835333636663932653237333664636232376333 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit: BPF prog-id=221 op=LOAD May 17 01:01:34.488000 audit[5741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b63d8 items=0 ppid=2152 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663635333438393835333636663932653237333664636232376333 May 17 01:01:34.488000 audit: BPF prog-id=221 op=UNLOAD May 17 01:01:34.488000 audit: BPF prog-id=220 op=UNLOAD May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.488000 audit: BPF prog-id=222 op=LOAD May 17 01:01:34.488000 audit[5741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b67e8 items=0 ppid=2152 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663635333438393835333636663932653237333664636232376333 May 17 01:01:34.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit: BPF prog-id=223 op=LOAD May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1840 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373230333630396262316266373633643366653834393964653964 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1840 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373230333630396262316266373633643366653834393964653964 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit: BPF prog-id=224 op=LOAD May 17 01:01:34.493000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000192470 items=0 ppid=1840 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373230333630396262316266373633643366653834393964653964 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit: BPF prog-id=225 op=LOAD May 17 01:01:34.493000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001924b8 items=0 ppid=1840 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373230333630396262316266373633643366653834393964653964 May 17 01:01:34.493000 audit: BPF prog-id=225 op=UNLOAD May 17 01:01:34.493000 audit: BPF prog-id=224 op=UNLOAD May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { perfmon } for pid=5742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit[5742]: AVC avc: denied { bpf } for pid=5742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.493000 audit: BPF prog-id=226 op=LOAD May 17 01:01:34.493000 audit[5742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001928c8 items=0 ppid=1840 pid=5742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373230333630396262316266373633643366653834393964653964 May 17 01:01:34.547410 env[1272]: time="2025-05-17T01:01:34.504270718Z" level=info msg="StartContainer for \"92f65348985366f92e2736dcb27c391fe2ab264f034a18913ba2463b322d4dbb\" returns successfully" May 17 01:01:34.547410 env[1272]: time="2025-05-17T01:01:34.522356541Z" level=info msg="StartContainer for \"c07203609bb1bf763d3fe8499de9d1eefb55d218b6011db48011007f3d0407b3\" returns successfully" May 17 01:01:34.525927 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2900335822.mount: Deactivated successfully. May 17 01:01:34.525978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount945858419.mount: Deactivated successfully. May 17 01:01:34.609407 env[1272]: time="2025-05-17T01:01:34.608872631Z" level=info msg="StartContainer for \"9da026477b74bcaf61ee8fb4af24627781241fe82f00bdde183985bbedad978c\"" May 17 01:01:34.630579 systemd[1]: Started cri-containerd-9da026477b74bcaf61ee8fb4af24627781241fe82f00bdde183985bbedad978c.scope. May 17 01:01:34.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit: BPF prog-id=227 op=LOAD May 17 01:01:34.657000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1795 pid=5796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613032363437376237346263616636316565386662346166323436 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1795 pid=5796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613032363437376237346263616636316565386662346166323436 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.657000 audit: BPF prog-id=228 op=LOAD May 17 01:01:34.657000 audit[5796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000358e90 items=0 ppid=1795 pid=5796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613032363437376237346263616636316565386662346166323436 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit: BPF prog-id=229 op=LOAD May 17 01:01:34.658000 audit[5796]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000358ed8 items=0 ppid=1795 pid=5796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613032363437376237346263616636316565386662346166323436 May 17 01:01:34.658000 audit: BPF prog-id=229 op=UNLOAD May 17 01:01:34.658000 audit: BPF prog-id=228 op=UNLOAD May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { perfmon } for pid=5796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit[5796]: AVC avc: denied { bpf } for pid=5796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:01:34.658000 audit: BPF prog-id=230 op=LOAD May 17 01:01:34.658000 audit[5796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003592e8 items=0 ppid=1795 pid=5796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:34.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613032363437376237346263616636316565386662346166323436 May 17 01:01:34.691814 env[1272]: time="2025-05-17T01:01:34.691784127Z" level=info msg="StartContainer for \"9da026477b74bcaf61ee8fb4af24627781241fe82f00bdde183985bbedad978c\" returns successfully" May 17 01:01:36.771000 audit[5810]: AVC avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:36.853060 kernel: kauditd_printk_skb: 184 callbacks suppressed May 17 01:01:36.860396 kernel: audit: type=1400 audit(1747443696.771:1611): avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:36.862384 kernel: audit: type=1300 audit(1747443696.771:1611): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0007ebd70 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:36.862414 kernel: audit: type=1327 audit(1747443696.771:1611): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:36.863658 kernel: audit: type=1400 audit(1747443696.776:1612): avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:36.864640 kernel: audit: type=1300 audit(1747443696.776:1612): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00005b8e0 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:36.864662 kernel: audit: type=1327 audit(1747443696.776:1612): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:36.771000 audit[5810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0007ebd70 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:36.771000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:36.776000 audit[5810]: AVC avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:36.776000 audit[5810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00005b8e0 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:36.776000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:42.146025 sshd[5672]: pam_unix(sshd:session): session closed for user core May 17 01:01:42.292271 kernel: audit: type=1106 audit(1747443702.213:1613): pid=5672 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.301090 kernel: audit: type=1104 audit(1747443702.213:1614): pid=5672 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.302696 kernel: audit: type=1130 audit(1747443702.233:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.101:22-147.75.109.163:39180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:42.302727 kernel: audit: type=1131 audit(1747443702.237:1616): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.101:22-147.75.109.163:54424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:42.213000 audit[5672]: USER_END pid=5672 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.213000 audit[5672]: CRED_DISP pid=5672 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.101:22-147.75.109.163:39180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:42.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.101:22-147.75.109.163:54424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:42.233900 systemd[1]: Started sshd@19-139.178.70.101:22-147.75.109.163:39180.service. May 17 01:01:42.238724 systemd[1]: sshd@18-139.178.70.101:22-147.75.109.163:54424.service: Deactivated successfully. May 17 01:01:42.239374 systemd[1]: session-21.scope: Deactivated successfully. May 17 01:01:42.239457 systemd[1]: session-21.scope: Consumed 2.633s CPU time. May 17 01:01:42.244488 systemd-logind[1241]: Session 21 logged out. Waiting for processes to exit. May 17 01:01:42.245267 systemd-logind[1241]: Removed session 21. May 17 01:01:42.414000 audit[5850]: USER_ACCT pid=5850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.432401 kernel: audit: type=1101 audit(1747443702.414:1617): pid=5850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.432466 kernel: audit: type=1103 audit(1747443702.419:1618): pid=5850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.432487 kernel: audit: type=1006 audit(1747443702.423:1619): pid=5850 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 01:01:42.435683 kernel: audit: type=1300 audit(1747443702.423:1619): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd176ec130 a2=3 a3=0 items=0 ppid=1 pid=5850 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:42.435720 kernel: audit: type=1327 audit(1747443702.423:1619): proctitle=737368643A20636F7265205B707269765D May 17 01:01:42.419000 audit[5850]: CRED_ACQ pid=5850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.423000 audit[5850]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd176ec130 a2=3 a3=0 items=0 ppid=1 pid=5850 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:42.423000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:01:42.453716 sshd[5850]: Accepted publickey for core from 147.75.109.163 port 39180 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:01:42.432343 sshd[5850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:01:42.478484 systemd[1]: Started session-22.scope. May 17 01:01:42.479459 systemd-logind[1241]: New session 22 of user core. May 17 01:01:42.482000 audit[5850]: USER_START pid=5850 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.487037 kernel: audit: type=1105 audit(1747443702.482:1620): pid=5850 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.486000 audit[5853]: CRED_ACQ pid=5853 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:42.711144 kubelet[2102]: E0517 01:01:42.709042 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="5.472s" May 17 01:01:47.329270 sshd[5850]: pam_unix(sshd:session): session closed for user core May 17 01:01:47.400735 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 01:01:47.404864 kernel: audit: type=1106 audit(1747443707.355:1622): pid=5850 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:47.407682 kernel: audit: type=1104 audit(1747443707.360:1623): pid=5850 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:47.408751 kernel: audit: type=1131 audit(1747443707.382:1624): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.101:22-147.75.109.163:39180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:47.355000 audit[5850]: USER_END pid=5850 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:47.360000 audit[5850]: CRED_DISP pid=5850 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:47.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.101:22-147.75.109.163:39180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:47.379876 systemd[1]: sshd@19-139.178.70.101:22-147.75.109.163:39180.service: Deactivated successfully. May 17 01:01:47.388364 systemd[1]: session-22.scope: Deactivated successfully. May 17 01:01:47.388447 systemd[1]: session-22.scope: Consumed 1.112s CPU time. May 17 01:01:47.388824 systemd-logind[1241]: Session 22 logged out. Waiting for processes to exit. May 17 01:01:47.399976 systemd-logind[1241]: Removed session 22. May 17 01:01:47.527260 env[1272]: time="2025-05-17T01:01:47.525004665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 01:01:47.840211 env[1272]: time="2025-05-17T01:01:47.840122126Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:01:47.841877 env[1272]: time="2025-05-17T01:01:47.841799704Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:01:47.849782 kubelet[2102]: E0517 01:01:47.847738 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:01:47.851672 kubelet[2102]: E0517 01:01:47.851185 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 01:01:47.851766 env[1272]: time="2025-05-17T01:01:47.851446496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 01:01:47.861981 kubelet[2102]: E0517 01:01:47.861951 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jjdfq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-ws46h_calico-system(aa6e114e-decb-446a-8bda-8dbdb7e8f8a5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:01:47.871676 kubelet[2102]: E0517 01:01:47.870304 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 01:01:48.077368 env[1272]: time="2025-05-17T01:01:48.077325178Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:01:48.078348 env[1272]: time="2025-05-17T01:01:48.077645617Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:01:48.079273 kubelet[2102]: E0517 01:01:48.077824 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:01:48.079273 kubelet[2102]: E0517 01:01:48.077871 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 01:01:48.079273 kubelet[2102]: E0517 01:01:48.077995 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f3220a9cd9124e429d43096f605c6b7f,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-dqhvx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7978b49988-n5v9k_calico-system(818ef22a-f243-4e76-9a56-f361deab60e5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:01:48.080755 env[1272]: time="2025-05-17T01:01:48.079836289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 01:01:48.327269 env[1272]: time="2025-05-17T01:01:48.327224821Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 01:01:48.330714 env[1272]: time="2025-05-17T01:01:48.327809856Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 01:01:48.330787 kubelet[2102]: E0517 01:01:48.327993 2102 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:01:48.330787 kubelet[2102]: E0517 01:01:48.328040 2102 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 01:01:48.330787 kubelet[2102]: E0517 01:01:48.328120 2102 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-dqhvx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7978b49988-n5v9k_calico-system(818ef22a-f243-4e76-9a56-f361deab60e5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 01:01:48.330787 kubelet[2102]: E0517 01:01:48.329291 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7978b49988-n5v9k" podUID="818ef22a-f243-4e76-9a56-f361deab60e5" May 17 01:01:52.344767 systemd[1]: Started sshd@20-139.178.70.101:22-147.75.109.163:37970.service. May 17 01:01:52.372238 kernel: audit: type=1130 audit(1747443712.345:1625): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.101:22-147.75.109.163:37970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:52.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.101:22-147.75.109.163:37970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:01:52.507154 sshd[5887]: Accepted publickey for core from 147.75.109.163 port 37970 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:01:52.523590 kernel: audit: type=1101 audit(1747443712.506:1626): pid=5887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:52.523630 kernel: audit: type=1103 audit(1747443712.511:1627): pid=5887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:52.523651 kernel: audit: type=1006 audit(1747443712.511:1628): pid=5887 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 01:01:52.525128 kernel: audit: type=1300 audit(1747443712.511:1628): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2c9b7140 a2=3 a3=0 items=0 ppid=1 pid=5887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:52.526508 kernel: audit: type=1327 audit(1747443712.511:1628): proctitle=737368643A20636F7265205B707269765D May 17 01:01:52.506000 audit[5887]: USER_ACCT pid=5887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:52.511000 audit[5887]: CRED_ACQ pid=5887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:52.511000 audit[5887]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2c9b7140 a2=3 a3=0 items=0 ppid=1 pid=5887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:52.511000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:01:52.527009 sshd[5887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:01:52.577099 systemd[1]: Started session-23.scope. May 17 01:01:52.577370 systemd-logind[1241]: New session 23 of user core. May 17 01:01:52.581000 audit[5887]: USER_START pid=5887 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:52.589355 kernel: audit: type=1105 audit(1747443712.581:1629): pid=5887 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:52.589402 kernel: audit: type=1103 audit(1747443712.583:1630): pid=5889 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:52.583000 audit[5889]: CRED_ACQ pid=5889 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:01:54.051000 audit[5810]: AVC avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:54.121311 kernel: audit: type=1400 audit(1747443714.051:1631): avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:54.125801 kernel: audit: type=1300 audit(1747443714.051:1631): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00005a7e0 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:54.129765 kernel: audit: type=1327 audit(1747443714.051:1631): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:54.051000 audit[5810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00005a7e0 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:54.051000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:54.055000 audit[5810]: AVC avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:54.055000 audit[5810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000aaa960 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:54.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:54.055000 audit[5810]: AVC avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:54.055000 audit[5810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aaa9c0 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:54.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:54.055000 audit[5810]: AVC avc: denied { watch } for pid=5810 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:01:54.055000 audit[5810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aaaa00 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:54.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:54.491000 audit[5810]: AVC avc: denied { watch } for pid=5810 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7347 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 01:01:54.491000 audit[5810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00045f440 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:54.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:54.500000 audit[5810]: AVC avc: denied { watch } for pid=5810 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds" dev="sda9" ino=8261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 01:01:54.500000 audit[5810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001134280 a2=fc6 a3=0 items=0 ppid=1795 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:54.500000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:55.022000 audit[5916]: AVC avc: denied { execute } for pid=5916 comm="kube-controller" name="uds" dev="sda9" ino=8421 scontext=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=0 May 17 01:01:55.022000 audit[5916]: SYSCALL arch=c000003e syscall=59 success=no exit=-13 a0=c000a30ff0 a1=c0027859e0 a2=c002599300 a3=0 items=0 ppid=5810 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c294,c717 key=(null) May 17 01:01:55.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 01:01:56.181000 audit[5918]: NETFILTER_CFG table=filter:143 family=2 entries=36 op=nft_register_rule pid=5918 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:01:56.181000 audit[5918]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffedb95f780 a2=0 a3=7ffedb95f76c items=0 ppid=2246 pid=5918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:56.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:01:56.189000 audit[5918]: NETFILTER_CFG table=nat:144 family=2 entries=22 op=nft_register_rule pid=5918 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:01:56.189000 audit[5918]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffedb95f780 a2=0 a3=0 items=0 ppid=2246 pid=5918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:01:56.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:02:02.603000 audit[5921]: NETFILTER_CFG table=filter:145 family=2 entries=24 op=nft_register_rule pid=5921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:02:02.703852 kernel: kauditd_printk_skb: 24 callbacks suppressed May 17 01:02:02.713910 kernel: audit: type=1325 audit(1747443722.603:1640): table=filter:145 family=2 entries=24 op=nft_register_rule pid=5921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:02:02.715794 kernel: audit: type=1300 audit(1747443722.603:1640): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff3a96d3a0 a2=0 a3=7fff3a96d38c items=0 ppid=2246 pid=5921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:02:02.715832 kernel: audit: type=1327 audit(1747443722.603:1640): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:02:02.715857 kernel: audit: type=1325 audit(1747443722.616:1641): table=nat:146 family=2 entries=106 op=nft_register_chain pid=5921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:02:02.715875 kernel: audit: type=1300 audit(1747443722.616:1641): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff3a96d3a0 a2=0 a3=7fff3a96d38c items=0 ppid=2246 pid=5921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:02:02.717732 kernel: audit: type=1327 audit(1747443722.616:1641): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:02:02.603000 audit[5921]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff3a96d3a0 a2=0 a3=7fff3a96d38c items=0 ppid=2246 pid=5921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:02:02.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:02:02.616000 audit[5921]: NETFILTER_CFG table=nat:146 family=2 entries=106 op=nft_register_chain pid=5921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:02:02.616000 audit[5921]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff3a96d3a0 a2=0 a3=7fff3a96d38c items=0 ppid=2246 pid=5921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:02:02.616000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:02:09.124000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.245666 kernel: audit: type=1400 audit(1747443729.124:1642): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.249769 kernel: audit: type=1400 audit(1747443729.124:1643): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.250846 kernel: audit: type=1300 audit(1747443729.124:1643): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00e38bef0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.252075 kernel: audit: type=1327 audit(1747443729.124:1643): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:09.252124 kernel: audit: type=1300 audit(1747443729.124:1642): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00e38bec0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.252173 kernel: audit: type=1327 audit(1747443729.124:1642): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:09.252203 kernel: audit: type=1400 audit(1747443729.127:1644): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.253013 kernel: audit: type=1300 audit(1747443729.127:1644): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0101c04e0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.253055 kernel: audit: type=1327 audit(1747443729.127:1644): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:09.253081 kernel: audit: type=1400 audit(1747443729.143:1645): avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.124000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7316 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.124000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00e38bef0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:09.124000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00e38bec0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:09.127000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.127000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0101c04e0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:09.143000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.143000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00faaea20 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:09.143000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.143000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00faaea40 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:09.143000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 01:02:09.143000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0101c05d0 a2=fc6 a3=0 items=0 ppid=1802 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c341,c579 key=(null) May 17 01:02:09.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 17 01:02:10.840161 sshd[5887]: pam_unix(sshd:session): session closed for user core May 17 01:02:10.896000 audit[5887]: USER_END pid=5887 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:10.897000 audit[5887]: CRED_DISP pid=5887 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:10.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.101:22-147.75.109.163:37970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:10.915736 systemd[1]: sshd@20-139.178.70.101:22-147.75.109.163:37970.service: Deactivated successfully. May 17 01:02:10.923927 systemd[1]: session-23.scope: Deactivated successfully. May 17 01:02:10.924010 systemd[1]: session-23.scope: Consumed 2.885s CPU time. May 17 01:02:10.926458 systemd-logind[1241]: Session 23 logged out. Waiting for processes to exit. May 17 01:02:10.939097 systemd-logind[1241]: Removed session 23. May 17 01:02:12.570510 kubelet[2102]: E0517 01:02:12.360661 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-ws46h" podUID="aa6e114e-decb-446a-8bda-8dbdb7e8f8a5" May 17 01:02:15.881280 systemd[1]: Started sshd@21-139.178.70.101:22-147.75.109.163:54958.service. May 17 01:02:15.957983 kernel: kauditd_printk_skb: 11 callbacks suppressed May 17 01:02:15.967208 kernel: audit: type=1130 audit(1747443735.883:1651): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.101:22-147.75.109.163:54958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:15.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.101:22-147.75.109.163:54958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:16.160000 audit[5959]: USER_ACCT pid=5959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:16.191788 kernel: audit: type=1101 audit(1747443736.160:1652): pid=5959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:16.193496 kernel: audit: type=1103 audit(1747443736.166:1653): pid=5959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:16.196208 kernel: audit: type=1006 audit(1747443736.169:1654): pid=5959 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 01:02:16.196233 kernel: audit: type=1300 audit(1747443736.169:1654): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd148bd5c0 a2=3 a3=0 items=0 ppid=1 pid=5959 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:02:16.196274 kernel: audit: type=1327 audit(1747443736.169:1654): proctitle=737368643A20636F7265205B707269765D May 17 01:02:16.166000 audit[5959]: CRED_ACQ pid=5959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:16.169000 audit[5959]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd148bd5c0 a2=3 a3=0 items=0 ppid=1 pid=5959 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:02:16.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:02:16.240958 sshd[5959]: Accepted publickey for core from 147.75.109.163 port 54958 ssh2: RSA SHA256:c2z/7wLfdEkcn4/VTlfeChibQyT7Fv7HLPVdQSmDlR8 May 17 01:02:16.184059 sshd[5959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:02:16.308205 systemd-logind[1241]: New session 24 of user core. May 17 01:02:16.310451 systemd[1]: Started session-24.scope. May 17 01:02:16.330791 kernel: audit: type=1105 audit(1747443736.321:1655): pid=5959 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:16.330840 kernel: audit: type=1103 audit(1747443736.326:1656): pid=5961 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:16.321000 audit[5959]: USER_START pid=5959 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:16.326000 audit[5961]: CRED_ACQ pid=5961 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:17.065000 audit[4480]: AVC avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 01:02:17.156274 kernel: audit: type=1400 audit(1747443737.065:1657): avc: denied { watch } for pid=4480 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3022756143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c326,c891 tclass=file permissive=0 May 17 01:02:17.166583 kernel: audit: type=1300 audit(1747443737.065:1657): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b7e660 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 01:02:17.065000 audit[4480]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001b7e660 a2=fc6 a3=0 items=0 ppid=3880 pid=4480 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c326,c891 key=(null) May 17 01:02:17.065000 audit[4201]: AVC avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_56_45.3692257446/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c880,c1020 tclass=file permissive=0 May 17 01:02:17.065000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:02:17.065000 audit[4201]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00101c320 a2=fc6 a3=0 items=0 ppid=3732 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c880,c1020 key=(null) May 17 01:02:17.065000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 01:02:23.521633 kubelet[2102]: E0517 01:02:22.300564 2102 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="8.394s" May 17 01:02:29.181920 sshd[5959]: pam_unix(sshd:session): session closed for user core May 17 01:02:29.272724 kernel: kauditd_printk_skb: 4 callbacks suppressed May 17 01:02:29.275714 kernel: audit: type=1106 audit(1747443749.230:1659): pid=5959 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:29.278310 kernel: audit: type=1104 audit(1747443749.235:1660): pid=5959 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:29.278345 kernel: audit: type=1131 audit(1747443749.259:1661): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.101:22-147.75.109.163:54958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:29.230000 audit[5959]: USER_END pid=5959 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:29.235000 audit[5959]: CRED_DISP pid=5959 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 17 01:02:29.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.101:22-147.75.109.163:54958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:02:29.257995 systemd[1]: sshd@21-139.178.70.101:22-147.75.109.163:54958.service: Deactivated successfully. May 17 01:02:29.260507 systemd[1]: session-24.scope: Deactivated successfully. May 17 01:02:29.260591 systemd[1]: session-24.scope: Consumed 2.585s CPU time. May 17 01:02:29.264497 systemd-logind[1241]: Session 24 logged out. Waiting for processes to exit. May 17 01:02:29.275404 systemd-logind[1241]: Removed session 24.