May 13 07:14:53.902587 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 07:14:53.902612 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 07:14:53.902623 kernel: BIOS-provided physical RAM map: May 13 07:14:53.902632 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 13 07:14:53.902640 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 13 07:14:53.902647 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 13 07:14:53.902656 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 13 07:14:53.902664 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 13 07:14:53.902671 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 13 07:14:53.902678 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 13 07:14:53.902686 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 13 07:14:53.902693 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 13 07:14:53.902704 kernel: NX (Execute Disable) protection: active May 13 07:14:53.902711 kernel: SMBIOS 3.0.0 present. May 13 07:14:53.902720 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 13 07:14:53.902729 kernel: Hypervisor detected: KVM May 13 07:14:53.902736 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 07:14:53.902744 kernel: kvm-clock: cpu 0, msr 2b196001, primary cpu clock May 13 07:14:53.902756 kernel: kvm-clock: using sched offset of 4112758022 cycles May 13 07:14:53.902765 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 07:14:53.902773 kernel: tsc: Detected 1996.249 MHz processor May 13 07:14:53.902781 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 07:14:53.902790 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 07:14:53.902798 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 13 07:14:53.902806 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 07:14:53.902814 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 13 07:14:53.902822 kernel: ACPI: Early table checksum verification disabled May 13 07:14:53.902832 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 13 07:14:53.902840 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 07:14:53.902864 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 07:14:53.902872 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 07:14:53.902880 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 13 07:14:53.902888 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 07:14:53.902896 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 07:14:53.902904 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 13 07:14:53.902916 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 13 07:14:53.902924 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 13 07:14:53.902932 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 13 07:14:53.902940 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 13 07:14:53.902948 kernel: No NUMA configuration found May 13 07:14:53.902961 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 13 07:14:53.902969 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] May 13 07:14:53.902981 kernel: Zone ranges: May 13 07:14:53.902989 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 07:14:53.902998 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 13 07:14:53.903006 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 13 07:14:53.903014 kernel: Movable zone start for each node May 13 07:14:53.903023 kernel: Early memory node ranges May 13 07:14:53.903031 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 13 07:14:53.903040 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 13 07:14:53.903050 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 13 07:14:53.903058 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 13 07:14:53.903067 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 07:14:53.903075 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 13 07:14:53.903084 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 13 07:14:53.903092 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 07:14:53.903101 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 07:14:53.903109 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 07:14:53.903118 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 07:14:53.903128 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 07:14:53.903136 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 07:14:53.903145 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 07:14:53.903153 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 07:14:53.903162 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 07:14:53.903170 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 13 07:14:53.903179 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 13 07:14:53.903187 kernel: Booting paravirtualized kernel on KVM May 13 07:14:53.903196 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 07:14:53.903207 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 13 07:14:53.903216 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 13 07:14:53.903224 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 13 07:14:53.903232 kernel: pcpu-alloc: [0] 0 1 May 13 07:14:53.903240 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 13 07:14:53.903249 kernel: kvm-guest: PV spinlocks disabled, no host support May 13 07:14:53.903257 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 13 07:14:53.903266 kernel: Policy zone: Normal May 13 07:14:53.903276 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 07:14:53.903289 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 07:14:53.903298 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 07:14:53.903306 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 07:14:53.903315 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 07:14:53.903324 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 225236K reserved, 0K cma-reserved) May 13 07:14:53.903332 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 13 07:14:53.903341 kernel: ftrace: allocating 34584 entries in 136 pages May 13 07:14:53.903349 kernel: ftrace: allocated 136 pages with 2 groups May 13 07:14:53.903361 kernel: rcu: Hierarchical RCU implementation. May 13 07:14:53.903370 kernel: rcu: RCU event tracing is enabled. May 13 07:14:53.903379 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 13 07:14:53.903388 kernel: Rude variant of Tasks RCU enabled. May 13 07:14:53.903396 kernel: Tracing variant of Tasks RCU enabled. May 13 07:14:53.903405 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 07:14:53.903413 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 13 07:14:53.903422 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 13 07:14:53.903430 kernel: Console: colour VGA+ 80x25 May 13 07:14:53.903440 kernel: printk: console [tty0] enabled May 13 07:14:53.903449 kernel: printk: console [ttyS0] enabled May 13 07:14:53.903457 kernel: ACPI: Core revision 20210730 May 13 07:14:53.903466 kernel: APIC: Switch to symmetric I/O mode setup May 13 07:14:53.903474 kernel: x2apic enabled May 13 07:14:53.903482 kernel: Switched APIC routing to physical x2apic. May 13 07:14:53.903491 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 07:14:53.903500 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 07:14:53.903508 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 13 07:14:53.903518 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 13 07:14:53.903527 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 13 07:14:53.903535 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 07:14:53.903544 kernel: Spectre V2 : Mitigation: Retpolines May 13 07:14:53.903552 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 07:14:53.903561 kernel: Speculative Store Bypass: Vulnerable May 13 07:14:53.903569 kernel: x86/fpu: x87 FPU will use FXSAVE May 13 07:14:53.903578 kernel: Freeing SMP alternatives memory: 32K May 13 07:14:53.903586 kernel: pid_max: default: 32768 minimum: 301 May 13 07:14:53.903597 kernel: LSM: Security Framework initializing May 13 07:14:53.903605 kernel: SELinux: Initializing. May 13 07:14:53.903614 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 07:14:53.903622 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 07:14:53.903631 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 13 07:14:53.903640 kernel: Performance Events: AMD PMU driver. May 13 07:14:53.903660 kernel: ... version: 0 May 13 07:14:53.903671 kernel: ... bit width: 48 May 13 07:14:53.903679 kernel: ... generic registers: 4 May 13 07:14:53.903688 kernel: ... value mask: 0000ffffffffffff May 13 07:14:53.903697 kernel: ... max period: 00007fffffffffff May 13 07:14:53.903706 kernel: ... fixed-purpose events: 0 May 13 07:14:53.903716 kernel: ... event mask: 000000000000000f May 13 07:14:53.903725 kernel: signal: max sigframe size: 1440 May 13 07:14:53.903734 kernel: rcu: Hierarchical SRCU implementation. May 13 07:14:53.903743 kernel: smp: Bringing up secondary CPUs ... May 13 07:14:53.903751 kernel: x86: Booting SMP configuration: May 13 07:14:53.903762 kernel: .... node #0, CPUs: #1 May 13 07:14:53.903771 kernel: kvm-clock: cpu 1, msr 2b196041, secondary cpu clock May 13 07:14:53.903780 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 13 07:14:53.903789 kernel: smp: Brought up 1 node, 2 CPUs May 13 07:14:53.903798 kernel: smpboot: Max logical packages: 2 May 13 07:14:53.903807 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 13 07:14:53.903816 kernel: devtmpfs: initialized May 13 07:14:53.903824 kernel: x86/mm: Memory block size: 128MB May 13 07:14:53.903834 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 07:14:53.903856 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 13 07:14:53.903866 kernel: pinctrl core: initialized pinctrl subsystem May 13 07:14:53.903875 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 07:14:53.903883 kernel: audit: initializing netlink subsys (disabled) May 13 07:14:53.903893 kernel: audit: type=2000 audit(1747120493.187:1): state=initialized audit_enabled=0 res=1 May 13 07:14:53.903901 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 07:14:53.903910 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 07:14:53.903922 kernel: cpuidle: using governor menu May 13 07:14:53.903933 kernel: ACPI: bus type PCI registered May 13 07:14:53.903945 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 07:14:53.903954 kernel: dca service started, version 1.12.1 May 13 07:14:53.903962 kernel: PCI: Using configuration type 1 for base access May 13 07:14:53.903972 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 07:14:53.903981 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 07:14:53.903990 kernel: ACPI: Added _OSI(Module Device) May 13 07:14:53.903999 kernel: ACPI: Added _OSI(Processor Device) May 13 07:14:53.904008 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 07:14:53.904016 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 07:14:53.904027 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 07:14:53.904036 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 07:14:53.904045 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 07:14:53.904053 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 07:14:53.904062 kernel: ACPI: Interpreter enabled May 13 07:14:53.904071 kernel: ACPI: PM: (supports S0 S3 S5) May 13 07:14:53.904080 kernel: ACPI: Using IOAPIC for interrupt routing May 13 07:14:53.904089 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 07:14:53.904098 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 13 07:14:53.904123 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 07:14:53.904594 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 13 07:14:53.904695 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 13 07:14:53.904710 kernel: acpiphp: Slot [3] registered May 13 07:14:53.904720 kernel: acpiphp: Slot [4] registered May 13 07:14:53.904730 kernel: acpiphp: Slot [5] registered May 13 07:14:53.904739 kernel: acpiphp: Slot [6] registered May 13 07:14:53.904749 kernel: acpiphp: Slot [7] registered May 13 07:14:53.904761 kernel: acpiphp: Slot [8] registered May 13 07:14:53.904771 kernel: acpiphp: Slot [9] registered May 13 07:14:53.904780 kernel: acpiphp: Slot [10] registered May 13 07:14:53.904790 kernel: acpiphp: Slot [11] registered May 13 07:14:53.904800 kernel: acpiphp: Slot [12] registered May 13 07:14:53.904810 kernel: acpiphp: Slot [13] registered May 13 07:14:53.904819 kernel: acpiphp: Slot [14] registered May 13 07:14:53.904829 kernel: acpiphp: Slot [15] registered May 13 07:14:53.904838 kernel: acpiphp: Slot [16] registered May 13 07:14:53.907893 kernel: acpiphp: Slot [17] registered May 13 07:14:53.907903 kernel: acpiphp: Slot [18] registered May 13 07:14:53.907912 kernel: acpiphp: Slot [19] registered May 13 07:14:53.907921 kernel: acpiphp: Slot [20] registered May 13 07:14:53.907930 kernel: acpiphp: Slot [21] registered May 13 07:14:53.907939 kernel: acpiphp: Slot [22] registered May 13 07:14:53.907948 kernel: acpiphp: Slot [23] registered May 13 07:14:53.907957 kernel: acpiphp: Slot [24] registered May 13 07:14:53.907966 kernel: acpiphp: Slot [25] registered May 13 07:14:53.907975 kernel: acpiphp: Slot [26] registered May 13 07:14:53.907986 kernel: acpiphp: Slot [27] registered May 13 07:14:53.907994 kernel: acpiphp: Slot [28] registered May 13 07:14:53.908003 kernel: acpiphp: Slot [29] registered May 13 07:14:53.908012 kernel: acpiphp: Slot [30] registered May 13 07:14:53.908021 kernel: acpiphp: Slot [31] registered May 13 07:14:53.908030 kernel: PCI host bridge to bus 0000:00 May 13 07:14:53.908150 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 07:14:53.908236 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 07:14:53.908320 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 07:14:53.908401 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 07:14:53.908479 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 13 07:14:53.908561 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 07:14:53.908664 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 13 07:14:53.908766 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 13 07:14:53.908896 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 13 07:14:53.908992 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 13 07:14:53.909083 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 13 07:14:53.909169 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 13 07:14:53.909260 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 13 07:14:53.909351 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 13 07:14:53.909450 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 13 07:14:53.909547 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 13 07:14:53.909639 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 13 07:14:53.909738 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 13 07:14:53.909830 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 13 07:14:53.911967 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 13 07:14:53.912071 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 13 07:14:53.912185 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 13 07:14:53.912286 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 07:14:53.912393 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 13 07:14:53.912487 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 13 07:14:53.912578 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 13 07:14:53.912669 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 13 07:14:53.912759 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 13 07:14:53.912905 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 13 07:14:53.913012 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 13 07:14:53.913107 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 13 07:14:53.913202 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 13 07:14:53.913305 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 13 07:14:53.913407 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 13 07:14:53.913502 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 13 07:14:53.913610 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 13 07:14:53.913706 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 13 07:14:53.913806 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 13 07:14:53.918941 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 13 07:14:53.918960 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 07:14:53.918970 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 07:14:53.918979 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 07:14:53.918989 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 07:14:53.919002 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 13 07:14:53.919011 kernel: iommu: Default domain type: Translated May 13 07:14:53.919020 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 07:14:53.919112 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 13 07:14:53.919203 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 07:14:53.919295 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 13 07:14:53.919309 kernel: vgaarb: loaded May 13 07:14:53.919318 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 07:14:53.919328 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 07:14:53.919341 kernel: PTP clock support registered May 13 07:14:53.919350 kernel: PCI: Using ACPI for IRQ routing May 13 07:14:53.919359 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 07:14:53.919368 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 13 07:14:53.919377 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 13 07:14:53.919386 kernel: clocksource: Switched to clocksource kvm-clock May 13 07:14:53.919394 kernel: VFS: Disk quotas dquot_6.6.0 May 13 07:14:53.919404 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 07:14:53.919413 kernel: pnp: PnP ACPI init May 13 07:14:53.919510 kernel: pnp 00:03: [dma 2] May 13 07:14:53.919525 kernel: pnp: PnP ACPI: found 5 devices May 13 07:14:53.919534 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 07:14:53.919544 kernel: NET: Registered PF_INET protocol family May 13 07:14:53.919553 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 07:14:53.919562 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 07:14:53.919571 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 07:14:53.919581 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 07:14:53.919593 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 07:14:53.919602 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 07:14:53.919611 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 07:14:53.919620 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 07:14:53.919629 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 07:14:53.919639 kernel: NET: Registered PF_XDP protocol family May 13 07:14:53.919724 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 07:14:53.919809 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 07:14:53.919910 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 07:14:53.919997 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 13 07:14:53.920086 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 13 07:14:53.920201 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 13 07:14:53.920295 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 13 07:14:53.920386 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 13 07:14:53.920400 kernel: PCI: CLS 0 bytes, default 64 May 13 07:14:53.920409 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 13 07:14:53.920419 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 13 07:14:53.920431 kernel: Initialise system trusted keyrings May 13 07:14:53.920441 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 07:14:53.920450 kernel: Key type asymmetric registered May 13 07:14:53.920459 kernel: Asymmetric key parser 'x509' registered May 13 07:14:53.920468 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 07:14:53.920477 kernel: io scheduler mq-deadline registered May 13 07:14:53.920486 kernel: io scheduler kyber registered May 13 07:14:53.920495 kernel: io scheduler bfq registered May 13 07:14:53.920504 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 07:14:53.920516 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 13 07:14:53.920525 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 13 07:14:53.920535 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 13 07:14:53.920544 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 13 07:14:53.920553 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 07:14:53.920563 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 07:14:53.920572 kernel: random: crng init done May 13 07:14:53.920581 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 07:14:53.920590 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 07:14:53.920601 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 07:14:53.920611 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 07:14:53.920703 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 07:14:53.920786 kernel: rtc_cmos 00:04: registered as rtc0 May 13 07:14:53.920889 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T07:14:53 UTC (1747120493) May 13 07:14:53.920981 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 13 07:14:53.920994 kernel: NET: Registered PF_INET6 protocol family May 13 07:14:53.921003 kernel: Segment Routing with IPv6 May 13 07:14:53.921016 kernel: In-situ OAM (IOAM) with IPv6 May 13 07:14:53.921025 kernel: NET: Registered PF_PACKET protocol family May 13 07:14:53.921034 kernel: Key type dns_resolver registered May 13 07:14:53.921043 kernel: IPI shorthand broadcast: enabled May 13 07:14:53.921052 kernel: sched_clock: Marking stable (909006050, 167907508)->(1187149409, -110235851) May 13 07:14:53.921061 kernel: registered taskstats version 1 May 13 07:14:53.921070 kernel: Loading compiled-in X.509 certificates May 13 07:14:53.921079 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 07:14:53.921089 kernel: Key type .fscrypt registered May 13 07:14:53.921100 kernel: Key type fscrypt-provisioning registered May 13 07:14:53.921109 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 07:14:53.921118 kernel: ima: Allocated hash algorithm: sha1 May 13 07:14:53.921127 kernel: ima: No architecture policies found May 13 07:14:53.921136 kernel: clk: Disabling unused clocks May 13 07:14:53.921145 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 07:14:53.921155 kernel: Write protecting the kernel read-only data: 28672k May 13 07:14:53.921164 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 07:14:53.921175 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 07:14:53.921184 kernel: Run /init as init process May 13 07:14:53.921194 kernel: with arguments: May 13 07:14:53.921202 kernel: /init May 13 07:14:53.921211 kernel: with environment: May 13 07:14:53.921220 kernel: HOME=/ May 13 07:14:53.921229 kernel: TERM=linux May 13 07:14:53.921238 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 07:14:53.921250 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 07:14:53.921264 systemd[1]: Detected virtualization kvm. May 13 07:14:53.921274 systemd[1]: Detected architecture x86-64. May 13 07:14:53.921284 systemd[1]: Running in initrd. May 13 07:14:53.921293 systemd[1]: No hostname configured, using default hostname. May 13 07:14:53.921303 systemd[1]: Hostname set to . May 13 07:14:53.921313 systemd[1]: Initializing machine ID from VM UUID. May 13 07:14:53.921323 systemd[1]: Queued start job for default target initrd.target. May 13 07:14:53.921335 systemd[1]: Started systemd-ask-password-console.path. May 13 07:14:53.921345 systemd[1]: Reached target cryptsetup.target. May 13 07:14:53.921354 systemd[1]: Reached target paths.target. May 13 07:14:53.921363 systemd[1]: Reached target slices.target. May 13 07:14:53.921373 systemd[1]: Reached target swap.target. May 13 07:14:53.921382 systemd[1]: Reached target timers.target. May 13 07:14:53.921393 systemd[1]: Listening on iscsid.socket. May 13 07:14:53.921403 systemd[1]: Listening on iscsiuio.socket. May 13 07:14:53.921415 systemd[1]: Listening on systemd-journald-audit.socket. May 13 07:14:53.921435 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 07:14:53.921447 systemd[1]: Listening on systemd-journald.socket. May 13 07:14:53.921457 systemd[1]: Listening on systemd-networkd.socket. May 13 07:14:53.921467 systemd[1]: Listening on systemd-udevd-control.socket. May 13 07:14:53.921477 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 07:14:53.921489 systemd[1]: Reached target sockets.target. May 13 07:14:53.921499 systemd[1]: Starting kmod-static-nodes.service... May 13 07:14:53.921509 systemd[1]: Finished network-cleanup.service. May 13 07:14:53.921519 systemd[1]: Starting systemd-fsck-usr.service... May 13 07:14:53.921529 systemd[1]: Starting systemd-journald.service... May 13 07:14:53.921539 systemd[1]: Starting systemd-modules-load.service... May 13 07:14:53.921549 systemd[1]: Starting systemd-resolved.service... May 13 07:14:53.921559 systemd[1]: Starting systemd-vconsole-setup.service... May 13 07:14:53.921569 systemd[1]: Finished kmod-static-nodes.service. May 13 07:14:53.921581 systemd[1]: Finished systemd-fsck-usr.service. May 13 07:14:53.921596 systemd-journald[184]: Journal started May 13 07:14:53.921646 systemd-journald[184]: Runtime Journal (/run/log/journal/075f9bfc9ccf4aca9cb0acee803a71bb) is 8.0M, max 78.4M, 70.4M free. May 13 07:14:53.877226 systemd-modules-load[185]: Inserted module 'overlay' May 13 07:14:53.956856 systemd[1]: Started systemd-journald.service. May 13 07:14:53.956892 kernel: audit: type=1130 audit(1747120493.935:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.956907 kernel: audit: type=1130 audit(1747120493.937:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.956920 kernel: audit: type=1130 audit(1747120493.937:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.956932 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 07:14:53.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.929719 systemd-resolved[186]: Positive Trust Anchors: May 13 07:14:53.929729 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 07:14:53.929767 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 07:14:53.932655 systemd-resolved[186]: Defaulting to hostname 'linux'. May 13 07:14:53.977837 kernel: audit: type=1130 audit(1747120493.964:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.977893 kernel: Bridge firewalling registered May 13 07:14:53.977906 kernel: audit: type=1130 audit(1747120493.970:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.938087 systemd[1]: Started systemd-resolved.service. May 13 07:14:53.938616 systemd[1]: Reached target nss-lookup.target. May 13 07:14:53.956917 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 07:14:53.957639 systemd[1]: Finished systemd-vconsole-setup.service. May 13 07:14:53.966128 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 07:14:53.972478 systemd[1]: Starting dracut-cmdline-ask.service... May 13 07:14:53.972702 systemd-modules-load[185]: Inserted module 'br_netfilter' May 13 07:14:53.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:53.996733 systemd[1]: Finished dracut-cmdline-ask.service. May 13 07:14:54.002994 kernel: audit: type=1130 audit(1747120493.996:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.003283 systemd[1]: Starting dracut-cmdline.service... May 13 07:14:54.008876 kernel: SCSI subsystem initialized May 13 07:14:54.014251 dracut-cmdline[203]: dracut-dracut-053 May 13 07:14:54.017363 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 07:14:54.027127 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 07:14:54.027157 kernel: device-mapper: uevent: version 1.0.3 May 13 07:14:54.029229 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 07:14:54.035117 systemd-modules-load[185]: Inserted module 'dm_multipath' May 13 07:14:54.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.035944 systemd[1]: Finished systemd-modules-load.service. May 13 07:14:54.041790 systemd[1]: Starting systemd-sysctl.service... May 13 07:14:54.042327 kernel: audit: type=1130 audit(1747120494.035:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.050370 systemd[1]: Finished systemd-sysctl.service. May 13 07:14:54.056361 kernel: audit: type=1130 audit(1747120494.050:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.100885 kernel: Loading iSCSI transport class v2.0-870. May 13 07:14:54.121006 kernel: iscsi: registered transport (tcp) May 13 07:14:54.147199 kernel: iscsi: registered transport (qla4xxx) May 13 07:14:54.147278 kernel: QLogic iSCSI HBA Driver May 13 07:14:54.198501 systemd[1]: Finished dracut-cmdline.service. May 13 07:14:54.210968 kernel: audit: type=1130 audit(1747120494.198:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.199996 systemd[1]: Starting dracut-pre-udev.service... May 13 07:14:54.257941 kernel: raid6: sse2x4 gen() 12815 MB/s May 13 07:14:54.275905 kernel: raid6: sse2x4 xor() 5027 MB/s May 13 07:14:54.294142 kernel: raid6: sse2x2 gen() 13958 MB/s May 13 07:14:54.311938 kernel: raid6: sse2x2 xor() 8572 MB/s May 13 07:14:54.329940 kernel: raid6: sse2x1 gen() 10625 MB/s May 13 07:14:54.348360 kernel: raid6: sse2x1 xor() 6643 MB/s May 13 07:14:54.348416 kernel: raid6: using algorithm sse2x2 gen() 13958 MB/s May 13 07:14:54.348443 kernel: raid6: .... xor() 8572 MB/s, rmw enabled May 13 07:14:54.349636 kernel: raid6: using ssse3x2 recovery algorithm May 13 07:14:54.369756 kernel: xor: measuring software checksum speed May 13 07:14:54.369791 kernel: prefetch64-sse : 17142 MB/sec May 13 07:14:54.372397 kernel: generic_sse : 15321 MB/sec May 13 07:14:54.372419 kernel: xor: using function: prefetch64-sse (17142 MB/sec) May 13 07:14:54.487914 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 07:14:54.504553 systemd[1]: Finished dracut-pre-udev.service. May 13 07:14:54.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.504000 audit: BPF prog-id=7 op=LOAD May 13 07:14:54.504000 audit: BPF prog-id=8 op=LOAD May 13 07:14:54.506048 systemd[1]: Starting systemd-udevd.service... May 13 07:14:54.520112 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 13 07:14:54.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.524752 systemd[1]: Started systemd-udevd.service. May 13 07:14:54.529647 systemd[1]: Starting dracut-pre-trigger.service... May 13 07:14:54.552664 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 13 07:14:54.587139 systemd[1]: Finished dracut-pre-trigger.service. May 13 07:14:54.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.588584 systemd[1]: Starting systemd-udev-trigger.service... May 13 07:14:54.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:54.629863 systemd[1]: Finished systemd-udev-trigger.service. May 13 07:14:54.686332 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 13 07:14:54.708217 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 07:14:54.708236 kernel: GPT:17805311 != 20971519 May 13 07:14:54.708248 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 07:14:54.708259 kernel: GPT:17805311 != 20971519 May 13 07:14:54.708284 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 07:14:54.708334 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 07:14:54.713875 kernel: libata version 3.00 loaded. May 13 07:14:54.717252 kernel: ata_piix 0000:00:01.1: version 2.13 May 13 07:14:54.722530 kernel: scsi host0: ata_piix May 13 07:14:54.722762 kernel: scsi host1: ata_piix May 13 07:14:54.722961 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 13 07:14:54.722995 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 13 07:14:54.746879 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (449) May 13 07:14:54.749069 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 07:14:54.797954 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 07:14:54.799388 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 07:14:54.804983 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 07:14:54.810282 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 07:14:54.812404 systemd[1]: Starting disk-uuid.service... May 13 07:14:54.833025 disk-uuid[470]: Primary Header is updated. May 13 07:14:54.833025 disk-uuid[470]: Secondary Entries is updated. May 13 07:14:54.833025 disk-uuid[470]: Secondary Header is updated. May 13 07:14:54.841923 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 07:14:54.847870 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 07:14:55.865912 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 07:14:55.867142 disk-uuid[471]: The operation has completed successfully. May 13 07:14:55.936611 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 07:14:55.938581 systemd[1]: Finished disk-uuid.service. May 13 07:14:55.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:55.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:55.958220 systemd[1]: Starting verity-setup.service... May 13 07:14:55.995333 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 13 07:14:56.105129 systemd[1]: Found device dev-mapper-usr.device. May 13 07:14:56.108411 systemd[1]: Mounting sysusr-usr.mount... May 13 07:14:56.111364 systemd[1]: Finished verity-setup.service. May 13 07:14:56.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.254906 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 07:14:56.255663 systemd[1]: Mounted sysusr-usr.mount. May 13 07:14:56.257156 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 07:14:56.258767 systemd[1]: Starting ignition-setup.service... May 13 07:14:56.261467 systemd[1]: Starting parse-ip-for-networkd.service... May 13 07:14:56.275908 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 07:14:56.276010 kernel: BTRFS info (device vda6): using free space tree May 13 07:14:56.276041 kernel: BTRFS info (device vda6): has skinny extents May 13 07:14:56.297300 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 07:14:56.311584 systemd[1]: Finished ignition-setup.service. May 13 07:14:56.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.314578 systemd[1]: Starting ignition-fetch-offline.service... May 13 07:14:56.412620 systemd[1]: Finished parse-ip-for-networkd.service. May 13 07:14:56.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.413000 audit: BPF prog-id=9 op=LOAD May 13 07:14:56.415184 systemd[1]: Starting systemd-networkd.service... May 13 07:14:56.440949 systemd-networkd[642]: lo: Link UP May 13 07:14:56.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.440959 systemd-networkd[642]: lo: Gained carrier May 13 07:14:56.441384 systemd-networkd[642]: Enumeration completed May 13 07:14:56.441600 systemd[1]: Started systemd-networkd.service. May 13 07:14:56.441611 systemd-networkd[642]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 07:14:56.442724 systemd[1]: Reached target network.target. May 13 07:14:56.444792 systemd[1]: Starting iscsiuio.service... May 13 07:14:56.447103 systemd-networkd[642]: eth0: Link UP May 13 07:14:56.447108 systemd-networkd[642]: eth0: Gained carrier May 13 07:14:56.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.456995 systemd[1]: Started iscsiuio.service. May 13 07:14:56.458476 systemd[1]: Starting iscsid.service... May 13 07:14:56.461465 iscsid[651]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 07:14:56.461465 iscsid[651]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 07:14:56.461465 iscsid[651]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 07:14:56.461465 iscsid[651]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 07:14:56.461465 iscsid[651]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 07:14:56.461465 iscsid[651]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 07:14:56.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.462955 systemd[1]: Started iscsid.service. May 13 07:14:56.466374 systemd[1]: Starting dracut-initqueue.service... May 13 07:14:56.466929 systemd-networkd[642]: eth0: DHCPv4 address 172.24.4.235/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 13 07:14:56.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.478071 systemd[1]: Finished dracut-initqueue.service. May 13 07:14:56.478667 systemd[1]: Reached target remote-fs-pre.target. May 13 07:14:56.479126 systemd[1]: Reached target remote-cryptsetup.target. May 13 07:14:56.479569 systemd[1]: Reached target remote-fs.target. May 13 07:14:56.481620 systemd[1]: Starting dracut-pre-mount.service... May 13 07:14:56.491054 systemd[1]: Finished dracut-pre-mount.service. May 13 07:14:56.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.619421 ignition[562]: Ignition 2.14.0 May 13 07:14:56.619447 ignition[562]: Stage: fetch-offline May 13 07:14:56.619561 ignition[562]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 07:14:56.619604 ignition[562]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 07:14:56.621976 ignition[562]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 07:14:56.622188 ignition[562]: parsed url from cmdline: "" May 13 07:14:56.622198 ignition[562]: no config URL provided May 13 07:14:56.624495 systemd[1]: Finished ignition-fetch-offline.service. May 13 07:14:56.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.622210 ignition[562]: reading system config file "/usr/lib/ignition/user.ign" May 13 07:14:56.622229 ignition[562]: no config at "/usr/lib/ignition/user.ign" May 13 07:14:56.622248 ignition[562]: failed to fetch config: resource requires networking May 13 07:14:56.627679 systemd[1]: Starting ignition-fetch.service... May 13 07:14:56.622738 ignition[562]: Ignition finished successfully May 13 07:14:56.643204 ignition[665]: Ignition 2.14.0 May 13 07:14:56.644270 ignition[665]: Stage: fetch May 13 07:14:56.645086 ignition[665]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 07:14:56.646038 ignition[665]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 07:14:56.647444 ignition[665]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 07:14:56.648526 ignition[665]: parsed url from cmdline: "" May 13 07:14:56.648596 ignition[665]: no config URL provided May 13 07:14:56.649052 ignition[665]: reading system config file "/usr/lib/ignition/user.ign" May 13 07:14:56.649101 ignition[665]: no config at "/usr/lib/ignition/user.ign" May 13 07:14:56.655212 ignition[665]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 13 07:14:56.655260 ignition[665]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 13 07:14:56.656347 ignition[665]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 13 07:14:56.892619 ignition[665]: GET result: OK May 13 07:14:56.892912 ignition[665]: parsing config with SHA512: 081876d46e1f76dfa56a14196769b0026a281e84c3a6721aeac84ed0a30d3926fe4c34287203129a1c86f8f24443203f34e64a203bdb8bab9216c25d36c78635 May 13 07:14:56.910499 unknown[665]: fetched base config from "system" May 13 07:14:56.912015 unknown[665]: fetched base config from "system" May 13 07:14:56.913403 unknown[665]: fetched user config from "openstack" May 13 07:14:56.915963 ignition[665]: fetch: fetch complete May 13 07:14:56.917329 ignition[665]: fetch: fetch passed May 13 07:14:56.918158 ignition[665]: Ignition finished successfully May 13 07:14:56.921065 systemd[1]: Finished ignition-fetch.service. May 13 07:14:56.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.924226 systemd[1]: Starting ignition-kargs.service... May 13 07:14:56.953436 ignition[671]: Ignition 2.14.0 May 13 07:14:56.954883 ignition[671]: Stage: kargs May 13 07:14:56.956006 ignition[671]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 07:14:56.957051 ignition[671]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 07:14:56.959462 ignition[671]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 07:14:56.962371 ignition[671]: kargs: kargs passed May 13 07:14:56.962528 ignition[671]: Ignition finished successfully May 13 07:14:56.964373 systemd[1]: Finished ignition-kargs.service. May 13 07:14:56.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.967441 systemd[1]: Starting ignition-disks.service... May 13 07:14:56.981662 ignition[676]: Ignition 2.14.0 May 13 07:14:56.981688 ignition[676]: Stage: disks May 13 07:14:56.981941 ignition[676]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 07:14:56.981984 ignition[676]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 07:14:56.983804 ignition[676]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 07:14:56.986015 ignition[676]: disks: disks passed May 13 07:14:56.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:56.987776 systemd[1]: Finished ignition-disks.service. May 13 07:14:56.986105 ignition[676]: Ignition finished successfully May 13 07:14:56.990106 systemd[1]: Reached target initrd-root-device.target. May 13 07:14:56.992128 systemd[1]: Reached target local-fs-pre.target. May 13 07:14:56.994233 systemd[1]: Reached target local-fs.target. May 13 07:14:56.996439 systemd[1]: Reached target sysinit.target. May 13 07:14:56.998597 systemd[1]: Reached target basic.target. May 13 07:14:57.002324 systemd[1]: Starting systemd-fsck-root.service... May 13 07:14:57.036994 systemd-fsck[684]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 13 07:14:57.051995 systemd[1]: Finished systemd-fsck-root.service. May 13 07:14:57.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:57.054510 systemd[1]: Mounting sysroot.mount... May 13 07:14:57.078881 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 07:14:57.079641 systemd[1]: Mounted sysroot.mount. May 13 07:14:57.080720 systemd[1]: Reached target initrd-root-fs.target. May 13 07:14:57.084787 systemd[1]: Mounting sysroot-usr.mount... May 13 07:14:57.086376 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 07:14:57.087617 systemd[1]: Starting flatcar-openstack-hostname.service... May 13 07:14:57.092431 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 07:14:57.092746 systemd[1]: Reached target ignition-diskful.target. May 13 07:14:57.099135 systemd[1]: Mounted sysroot-usr.mount. May 13 07:14:57.102208 systemd[1]: Starting initrd-setup-root.service... May 13 07:14:57.116541 initrd-setup-root[695]: cut: /sysroot/etc/passwd: No such file or directory May 13 07:14:57.140191 initrd-setup-root[703]: cut: /sysroot/etc/group: No such file or directory May 13 07:14:57.145817 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 07:14:57.159437 initrd-setup-root[712]: cut: /sysroot/etc/shadow: No such file or directory May 13 07:14:57.165903 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (706) May 13 07:14:57.178243 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 07:14:57.178346 kernel: BTRFS info (device vda6): using free space tree May 13 07:14:57.178377 kernel: BTRFS info (device vda6): has skinny extents May 13 07:14:57.181367 initrd-setup-root[721]: cut: /sysroot/etc/gshadow: No such file or directory May 13 07:14:57.210918 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 07:14:57.252708 systemd[1]: Finished initrd-setup-root.service. May 13 07:14:57.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:57.256153 systemd[1]: Starting ignition-mount.service... May 13 07:14:57.263262 systemd[1]: Starting sysroot-boot.service... May 13 07:14:57.272028 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 13 07:14:57.272196 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 13 07:14:57.294996 ignition[759]: INFO : Ignition 2.14.0 May 13 07:14:57.295707 ignition[759]: INFO : Stage: mount May 13 07:14:57.295707 ignition[759]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 07:14:57.295707 ignition[759]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 07:14:57.298047 ignition[759]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 07:14:57.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:57.300114 ignition[759]: INFO : mount: mount passed May 13 07:14:57.300114 ignition[759]: INFO : Ignition finished successfully May 13 07:14:57.299274 systemd[1]: Finished ignition-mount.service. May 13 07:14:57.314455 systemd[1]: Finished sysroot-boot.service. May 13 07:14:57.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:57.338110 coreos-metadata[690]: May 13 07:14:57.338 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 13 07:14:57.351063 coreos-metadata[690]: May 13 07:14:57.350 INFO Fetch successful May 13 07:14:57.351909 coreos-metadata[690]: May 13 07:14:57.351 INFO wrote hostname ci-3510-3-7-n-1a4ba3031a.novalocal to /sysroot/etc/hostname May 13 07:14:57.357304 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 13 07:14:57.357486 systemd[1]: Finished flatcar-openstack-hostname.service. May 13 07:14:57.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:57.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:14:57.361035 systemd[1]: Starting ignition-files.service... May 13 07:14:57.372029 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 07:14:57.381892 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (770) May 13 07:14:57.386286 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 07:14:57.386334 kernel: BTRFS info (device vda6): using free space tree May 13 07:14:57.386358 kernel: BTRFS info (device vda6): has skinny extents May 13 07:14:57.398787 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 07:14:57.417905 ignition[789]: INFO : Ignition 2.14.0 May 13 07:14:57.417905 ignition[789]: INFO : Stage: files May 13 07:14:57.419041 ignition[789]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 07:14:57.419041 ignition[789]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 07:14:57.420791 ignition[789]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 07:14:57.423501 ignition[789]: DEBUG : files: compiled without relabeling support, skipping May 13 07:14:57.424603 ignition[789]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 07:14:57.424603 ignition[789]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 07:14:57.429607 ignition[789]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 07:14:57.430407 ignition[789]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 07:14:57.431540 unknown[789]: wrote ssh authorized keys file for user: core May 13 07:14:57.432235 ignition[789]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 07:14:57.433010 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 07:14:57.433010 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 13 07:14:57.580463 systemd-networkd[642]: eth0: Gained IPv6LL May 13 07:14:57.864529 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 07:14:58.458166 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 07:14:58.459570 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 07:14:58.461225 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 07:14:58.461225 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 07:14:58.461225 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 07:14:58.461225 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 07:14:58.461225 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 07:14:58.461225 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 07:14:58.461225 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 07:14:58.469283 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 07:14:58.469283 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 07:14:58.469283 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 07:14:58.469283 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 07:14:58.469283 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 07:14:58.469283 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 13 07:14:59.280650 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 07:15:01.515713 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 07:15:01.515713 ignition[789]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 13 07:15:01.515713 ignition[789]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 13 07:15:01.515713 ignition[789]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 13 07:15:01.525417 ignition[789]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 07:15:01.525417 ignition[789]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 07:15:01.525417 ignition[789]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 13 07:15:01.525417 ignition[789]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 13 07:15:01.525417 ignition[789]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 13 07:15:01.525417 ignition[789]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 07:15:01.525417 ignition[789]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 07:15:01.548801 kernel: kauditd_printk_skb: 27 callbacks suppressed May 13 07:15:01.548927 kernel: audit: type=1130 audit(1747120501.534:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.530813 systemd[1]: Finished ignition-files.service. May 13 07:15:01.554219 ignition[789]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 07:15:01.554219 ignition[789]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 07:15:01.554219 ignition[789]: INFO : files: files passed May 13 07:15:01.554219 ignition[789]: INFO : Ignition finished successfully May 13 07:15:01.595765 kernel: audit: type=1130 audit(1747120501.556:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.595786 kernel: audit: type=1130 audit(1747120501.571:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.595799 kernel: audit: type=1131 audit(1747120501.571:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.539769 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 07:15:01.550469 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 07:15:01.597423 initrd-setup-root-after-ignition[812]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 07:15:01.551330 systemd[1]: Starting ignition-quench.service... May 13 07:15:01.554938 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 07:15:01.557628 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 07:15:01.557704 systemd[1]: Finished ignition-quench.service. May 13 07:15:01.571916 systemd[1]: Reached target ignition-complete.target. May 13 07:15:01.595544 systemd[1]: Starting initrd-parse-etc.service... May 13 07:15:01.609416 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 07:15:01.619736 kernel: audit: type=1130 audit(1747120501.609:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.619767 kernel: audit: type=1131 audit(1747120501.609:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.609515 systemd[1]: Finished initrd-parse-etc.service. May 13 07:15:01.610150 systemd[1]: Reached target initrd-fs.target. May 13 07:15:01.620210 systemd[1]: Reached target initrd.target. May 13 07:15:01.621231 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 07:15:01.622067 systemd[1]: Starting dracut-pre-pivot.service... May 13 07:15:01.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.642945 kernel: audit: type=1130 audit(1747120501.635:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.636336 systemd[1]: Finished dracut-pre-pivot.service. May 13 07:15:01.637634 systemd[1]: Starting initrd-cleanup.service... May 13 07:15:01.653337 systemd[1]: Stopped target nss-lookup.target. May 13 07:15:01.654572 systemd[1]: Stopped target remote-cryptsetup.target. May 13 07:15:01.655747 systemd[1]: Stopped target timers.target. May 13 07:15:01.656885 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 07:15:01.657020 systemd[1]: Stopped dracut-pre-pivot.service. May 13 07:15:01.663133 kernel: audit: type=1131 audit(1747120501.657:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.658579 systemd[1]: Stopped target initrd.target. May 13 07:15:01.664397 systemd[1]: Stopped target basic.target. May 13 07:15:01.665779 systemd[1]: Stopped target ignition-complete.target. May 13 07:15:01.667348 systemd[1]: Stopped target ignition-diskful.target. May 13 07:15:01.668978 systemd[1]: Stopped target initrd-root-device.target. May 13 07:15:01.670504 systemd[1]: Stopped target remote-fs.target. May 13 07:15:01.672059 systemd[1]: Stopped target remote-fs-pre.target. May 13 07:15:01.673760 systemd[1]: Stopped target sysinit.target. May 13 07:15:01.675209 systemd[1]: Stopped target local-fs.target. May 13 07:15:01.677283 systemd[1]: Stopped target local-fs-pre.target. May 13 07:15:01.679278 systemd[1]: Stopped target swap.target. May 13 07:15:01.681117 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 07:15:01.681514 systemd[1]: Stopped dracut-pre-mount.service. May 13 07:15:01.687762 kernel: audit: type=1131 audit(1747120501.682:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.683469 systemd[1]: Stopped target cryptsetup.target. May 13 07:15:01.689147 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 07:15:01.689475 systemd[1]: Stopped dracut-initqueue.service. May 13 07:15:01.695962 kernel: audit: type=1131 audit(1747120501.690:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.691556 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 07:15:01.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.691936 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 07:15:01.697632 systemd[1]: ignition-files.service: Deactivated successfully. May 13 07:15:01.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.698011 systemd[1]: Stopped ignition-files.service. May 13 07:15:01.705280 iscsid[651]: iscsid shutting down. May 13 07:15:01.701796 systemd[1]: Stopping ignition-mount.service... May 13 07:15:01.708105 systemd[1]: Stopping iscsid.service... May 13 07:15:01.709990 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 07:15:01.710382 systemd[1]: Stopped kmod-static-nodes.service. May 13 07:15:01.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.715289 systemd[1]: Stopping sysroot-boot.service... May 13 07:15:01.716705 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 07:15:01.717132 systemd[1]: Stopped systemd-udev-trigger.service. May 13 07:15:01.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.727081 ignition[827]: INFO : Ignition 2.14.0 May 13 07:15:01.727081 ignition[827]: INFO : Stage: umount May 13 07:15:01.727081 ignition[827]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 07:15:01.727081 ignition[827]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 07:15:01.727081 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 07:15:01.727081 ignition[827]: INFO : umount: umount passed May 13 07:15:01.727081 ignition[827]: INFO : Ignition finished successfully May 13 07:15:01.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.723537 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 07:15:01.723718 systemd[1]: Stopped dracut-pre-trigger.service. May 13 07:15:01.726910 systemd[1]: iscsid.service: Deactivated successfully. May 13 07:15:01.727686 systemd[1]: Stopped iscsid.service. May 13 07:15:01.730096 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 07:15:01.731000 systemd[1]: Finished initrd-cleanup.service. May 13 07:15:01.731729 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 07:15:01.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.737049 systemd[1]: Stopped ignition-mount.service. May 13 07:15:01.738860 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 07:15:01.740011 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 07:15:01.740053 systemd[1]: Stopped ignition-disks.service. May 13 07:15:01.740560 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 07:15:01.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.740596 systemd[1]: Stopped ignition-kargs.service. May 13 07:15:01.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.741095 systemd[1]: ignition-fetch.service: Deactivated successfully. May 13 07:15:01.741128 systemd[1]: Stopped ignition-fetch.service. May 13 07:15:01.741577 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 07:15:01.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.741610 systemd[1]: Stopped ignition-fetch-offline.service. May 13 07:15:01.742134 systemd[1]: Stopped target paths.target. May 13 07:15:01.742540 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 07:15:01.746019 systemd[1]: Stopped systemd-ask-password-console.path. May 13 07:15:01.746724 systemd[1]: Stopped target slices.target. May 13 07:15:01.747179 systemd[1]: Stopped target sockets.target. May 13 07:15:01.748185 systemd[1]: iscsid.socket: Deactivated successfully. May 13 07:15:01.748218 systemd[1]: Closed iscsid.socket. May 13 07:15:01.749207 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 07:15:01.749245 systemd[1]: Stopped ignition-setup.service. May 13 07:15:01.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.750249 systemd[1]: Stopping iscsiuio.service... May 13 07:15:01.753508 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 07:15:01.753586 systemd[1]: Stopped iscsiuio.service. May 13 07:15:01.754453 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 07:15:01.754524 systemd[1]: Stopped sysroot-boot.service. May 13 07:15:01.755330 systemd[1]: Stopped target network.target. May 13 07:15:01.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.756209 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 07:15:01.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.756241 systemd[1]: Closed iscsiuio.socket. May 13 07:15:01.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.757188 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 07:15:01.757223 systemd[1]: Stopped initrd-setup-root.service. May 13 07:15:01.758294 systemd[1]: Stopping systemd-networkd.service... May 13 07:15:01.759542 systemd[1]: Stopping systemd-resolved.service... May 13 07:15:01.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.762880 systemd-networkd[642]: eth0: DHCPv6 lease lost May 13 07:15:01.776000 audit: BPF prog-id=9 op=UNLOAD May 13 07:15:01.764066 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 07:15:01.764166 systemd[1]: Stopped systemd-networkd.service. May 13 07:15:01.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.765800 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 07:15:01.765829 systemd[1]: Closed systemd-networkd.socket. May 13 07:15:01.780000 audit: BPF prog-id=6 op=UNLOAD May 13 07:15:01.768225 systemd[1]: Stopping network-cleanup.service... May 13 07:15:01.769113 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 07:15:01.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.769159 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 07:15:01.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.771369 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 07:15:01.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.771408 systemd[1]: Stopped systemd-sysctl.service. May 13 07:15:01.772570 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 07:15:01.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.772608 systemd[1]: Stopped systemd-modules-load.service. May 13 07:15:01.773597 systemd[1]: Stopping systemd-udevd.service... May 13 07:15:01.775320 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 07:15:01.775745 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 07:15:01.775827 systemd[1]: Stopped systemd-resolved.service. May 13 07:15:01.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:01.778519 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 07:15:01.778634 systemd[1]: Stopped systemd-udevd.service. May 13 07:15:01.780352 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 07:15:01.780387 systemd[1]: Closed systemd-udevd-control.socket. May 13 07:15:01.781146 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 07:15:01.781174 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 07:15:01.783308 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 07:15:01.783345 systemd[1]: Stopped dracut-pre-udev.service. May 13 07:15:01.784307 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 07:15:01.784343 systemd[1]: Stopped dracut-cmdline.service. May 13 07:15:01.785430 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 07:15:01.785465 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 07:15:01.787064 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 07:15:01.787885 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 07:15:01.787932 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 07:15:01.789974 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 07:15:01.790075 systemd[1]: Stopped network-cleanup.service. May 13 07:15:01.793403 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 07:15:01.793489 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 07:15:01.794326 systemd[1]: Reached target initrd-switch-root.target. May 13 07:15:01.795542 systemd[1]: Starting initrd-switch-root.service... May 13 07:15:01.817269 systemd[1]: Switching root. May 13 07:15:01.842828 systemd-journald[184]: Journal stopped May 13 07:15:06.286538 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). May 13 07:15:06.286596 kernel: SELinux: Class mctp_socket not defined in policy. May 13 07:15:06.286614 kernel: SELinux: Class anon_inode not defined in policy. May 13 07:15:06.286628 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 07:15:06.286639 kernel: SELinux: policy capability network_peer_controls=1 May 13 07:15:06.286650 kernel: SELinux: policy capability open_perms=1 May 13 07:15:06.286661 kernel: SELinux: policy capability extended_socket_class=1 May 13 07:15:06.286674 kernel: SELinux: policy capability always_check_network=0 May 13 07:15:06.286688 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 07:15:06.286699 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 07:15:06.286709 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 07:15:06.286720 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 07:15:06.286734 systemd[1]: Successfully loaded SELinux policy in 96.685ms. May 13 07:15:06.286750 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.910ms. May 13 07:15:06.286765 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 07:15:06.286778 systemd[1]: Detected virtualization kvm. May 13 07:15:06.286789 systemd[1]: Detected architecture x86-64. May 13 07:15:06.286806 systemd[1]: Detected first boot. May 13 07:15:06.286818 systemd[1]: Hostname set to . May 13 07:15:06.286829 systemd[1]: Initializing machine ID from VM UUID. May 13 07:15:06.286917 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 07:15:06.286933 systemd[1]: Populated /etc with preset unit settings. May 13 07:15:06.286946 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 07:15:06.286962 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 07:15:06.286977 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 07:15:06.286990 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 07:15:06.287001 systemd[1]: Stopped initrd-switch-root.service. May 13 07:15:06.287013 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 07:15:06.287025 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 07:15:06.287037 systemd[1]: Created slice system-addon\x2drun.slice. May 13 07:15:06.287053 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 13 07:15:06.287067 systemd[1]: Created slice system-getty.slice. May 13 07:15:06.287078 systemd[1]: Created slice system-modprobe.slice. May 13 07:15:06.287090 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 07:15:06.287102 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 07:15:06.287113 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 07:15:06.287126 systemd[1]: Created slice user.slice. May 13 07:15:06.287137 systemd[1]: Started systemd-ask-password-console.path. May 13 07:15:06.287149 systemd[1]: Started systemd-ask-password-wall.path. May 13 07:15:06.287163 systemd[1]: Set up automount boot.automount. May 13 07:15:06.287176 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 07:15:06.287188 systemd[1]: Stopped target initrd-switch-root.target. May 13 07:15:06.287200 systemd[1]: Stopped target initrd-fs.target. May 13 07:15:06.287212 systemd[1]: Stopped target initrd-root-fs.target. May 13 07:15:06.287224 systemd[1]: Reached target integritysetup.target. May 13 07:15:06.287235 systemd[1]: Reached target remote-cryptsetup.target. May 13 07:15:06.287248 systemd[1]: Reached target remote-fs.target. May 13 07:15:06.287260 systemd[1]: Reached target slices.target. May 13 07:15:06.287271 systemd[1]: Reached target swap.target. May 13 07:15:06.287283 systemd[1]: Reached target torcx.target. May 13 07:15:06.287294 systemd[1]: Reached target veritysetup.target. May 13 07:15:06.287305 systemd[1]: Listening on systemd-coredump.socket. May 13 07:15:06.287317 systemd[1]: Listening on systemd-initctl.socket. May 13 07:15:06.287328 systemd[1]: Listening on systemd-networkd.socket. May 13 07:15:06.287340 systemd[1]: Listening on systemd-udevd-control.socket. May 13 07:15:06.287351 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 07:15:06.287365 systemd[1]: Listening on systemd-userdbd.socket. May 13 07:15:06.287378 systemd[1]: Mounting dev-hugepages.mount... May 13 07:15:06.287390 systemd[1]: Mounting dev-mqueue.mount... May 13 07:15:06.287402 systemd[1]: Mounting media.mount... May 13 07:15:06.287413 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:06.287425 systemd[1]: Mounting sys-kernel-debug.mount... May 13 07:15:06.287437 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 07:15:06.287448 systemd[1]: Mounting tmp.mount... May 13 07:15:06.287459 systemd[1]: Starting flatcar-tmpfiles.service... May 13 07:15:06.287473 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 07:15:06.287485 systemd[1]: Starting kmod-static-nodes.service... May 13 07:15:06.287496 systemd[1]: Starting modprobe@configfs.service... May 13 07:15:06.287508 systemd[1]: Starting modprobe@dm_mod.service... May 13 07:15:06.287519 systemd[1]: Starting modprobe@drm.service... May 13 07:15:06.287531 systemd[1]: Starting modprobe@efi_pstore.service... May 13 07:15:06.287542 systemd[1]: Starting modprobe@fuse.service... May 13 07:15:06.287553 systemd[1]: Starting modprobe@loop.service... May 13 07:15:06.287565 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 07:15:06.287579 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 07:15:06.287591 systemd[1]: Stopped systemd-fsck-root.service. May 13 07:15:06.287602 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 07:15:06.287614 systemd[1]: Stopped systemd-fsck-usr.service. May 13 07:15:06.287627 systemd[1]: Stopped systemd-journald.service. May 13 07:15:06.287638 systemd[1]: Starting systemd-journald.service... May 13 07:15:06.287650 systemd[1]: Starting systemd-modules-load.service... May 13 07:15:06.287662 systemd[1]: Starting systemd-network-generator.service... May 13 07:15:06.287674 systemd[1]: Starting systemd-remount-fs.service... May 13 07:15:06.287688 systemd[1]: Starting systemd-udev-trigger.service... May 13 07:15:06.287700 systemd[1]: verity-setup.service: Deactivated successfully. May 13 07:15:06.287711 systemd[1]: Stopped verity-setup.service. May 13 07:15:06.287723 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:06.287734 kernel: fuse: init (API version 7.34) May 13 07:15:06.287745 systemd[1]: Mounted dev-hugepages.mount. May 13 07:15:06.287757 systemd[1]: Mounted dev-mqueue.mount. May 13 07:15:06.287768 systemd[1]: Mounted media.mount. May 13 07:15:06.287780 systemd[1]: Mounted sys-kernel-debug.mount. May 13 07:15:06.287793 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 07:15:06.287805 systemd[1]: Mounted tmp.mount. May 13 07:15:06.287816 systemd[1]: Finished kmod-static-nodes.service. May 13 07:15:06.287828 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 07:15:06.287840 systemd[1]: Finished modprobe@configfs.service. May 13 07:15:06.287865 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 07:15:06.287879 systemd-journald[933]: Journal started May 13 07:15:06.287921 systemd-journald[933]: Runtime Journal (/run/log/journal/075f9bfc9ccf4aca9cb0acee803a71bb) is 8.0M, max 78.4M, 70.4M free. May 13 07:15:02.131000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 07:15:02.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 07:15:06.292730 kernel: loop: module loaded May 13 07:15:06.292754 systemd[1]: Finished modprobe@dm_mod.service. May 13 07:15:06.292773 systemd[1]: Started systemd-journald.service. May 13 07:15:02.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 07:15:02.226000 audit: BPF prog-id=10 op=LOAD May 13 07:15:02.226000 audit: BPF prog-id=10 op=UNLOAD May 13 07:15:02.226000 audit: BPF prog-id=11 op=LOAD May 13 07:15:02.226000 audit: BPF prog-id=11 op=UNLOAD May 13 07:15:02.391000 audit[859]: AVC avc: denied { associate } for pid=859 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 07:15:02.391000 audit[859]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178c2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=842 pid=859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:02.391000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 07:15:02.394000 audit[859]: AVC avc: denied { associate } for pid=859 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 07:15:02.394000 audit[859]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000117999 a2=1ed a3=0 items=2 ppid=842 pid=859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:02.394000 audit: CWD cwd="/" May 13 07:15:02.394000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:02.394000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:02.394000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 07:15:06.050000 audit: BPF prog-id=12 op=LOAD May 13 07:15:06.050000 audit: BPF prog-id=3 op=UNLOAD May 13 07:15:06.050000 audit: BPF prog-id=13 op=LOAD May 13 07:15:06.050000 audit: BPF prog-id=14 op=LOAD May 13 07:15:06.050000 audit: BPF prog-id=4 op=UNLOAD May 13 07:15:06.050000 audit: BPF prog-id=5 op=UNLOAD May 13 07:15:06.052000 audit: BPF prog-id=15 op=LOAD May 13 07:15:06.052000 audit: BPF prog-id=12 op=UNLOAD May 13 07:15:06.052000 audit: BPF prog-id=16 op=LOAD May 13 07:15:06.052000 audit: BPF prog-id=17 op=LOAD May 13 07:15:06.052000 audit: BPF prog-id=13 op=UNLOAD May 13 07:15:06.052000 audit: BPF prog-id=14 op=UNLOAD May 13 07:15:06.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.062000 audit: BPF prog-id=15 op=UNLOAD May 13 07:15:06.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.226000 audit: BPF prog-id=18 op=LOAD May 13 07:15:06.227000 audit: BPF prog-id=19 op=LOAD May 13 07:15:06.227000 audit: BPF prog-id=20 op=LOAD May 13 07:15:06.227000 audit: BPF prog-id=16 op=UNLOAD May 13 07:15:06.227000 audit: BPF prog-id=17 op=UNLOAD May 13 07:15:06.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.283000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 07:15:06.283000 audit[933]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc9e06ca70 a2=4000 a3=7ffc9e06cb0c items=0 ppid=1 pid=933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:06.283000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 07:15:06.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:02.388015 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 07:15:06.047014 systemd[1]: Queued start job for default target multi-user.target. May 13 07:15:02.388968 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 07:15:06.047036 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 07:15:02.388990 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 07:15:06.053930 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 07:15:06.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:02.389027 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 07:15:06.294816 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 07:15:02.389039 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 07:15:02.389081 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 07:15:02.389095 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 07:15:02.389320 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 07:15:02.389359 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 07:15:02.389373 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 07:15:02.391386 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 07:15:02.391425 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 07:15:06.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:02.391446 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 07:15:06.296359 systemd[1]: Finished modprobe@drm.service. May 13 07:15:02.391463 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 07:15:06.297276 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 07:15:02.391483 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 07:15:02.391499 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 07:15:05.596250 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 07:15:05.596541 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 07:15:05.596653 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 07:15:05.596885 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 07:15:05.596948 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 07:15:05.597016 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-13T07:15:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 07:15:06.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.298446 systemd[1]: Finished modprobe@efi_pstore.service. May 13 07:15:06.299429 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 07:15:06.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.300513 systemd[1]: Finished modprobe@fuse.service. May 13 07:15:06.301367 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 07:15:06.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.304245 systemd[1]: Finished modprobe@loop.service. May 13 07:15:06.305781 systemd[1]: Finished systemd-modules-load.service. May 13 07:15:06.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.307960 systemd[1]: Finished systemd-network-generator.service. May 13 07:15:06.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.308724 systemd[1]: Finished systemd-remount-fs.service. May 13 07:15:06.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.309691 systemd[1]: Reached target network-pre.target. May 13 07:15:06.311531 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 07:15:06.313275 systemd[1]: Mounting sys-kernel-config.mount... May 13 07:15:06.316390 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 07:15:06.320006 systemd[1]: Starting systemd-hwdb-update.service... May 13 07:15:06.321569 systemd[1]: Starting systemd-journal-flush.service... May 13 07:15:06.322147 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 07:15:06.323323 systemd[1]: Starting systemd-random-seed.service... May 13 07:15:06.323954 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 07:15:06.325813 systemd[1]: Starting systemd-sysctl.service... May 13 07:15:06.328168 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 07:15:06.329108 systemd[1]: Mounted sys-kernel-config.mount. May 13 07:15:06.334264 systemd-journald[933]: Time spent on flushing to /var/log/journal/075f9bfc9ccf4aca9cb0acee803a71bb is 34.696ms for 1098 entries. May 13 07:15:06.334264 systemd-journald[933]: System Journal (/var/log/journal/075f9bfc9ccf4aca9cb0acee803a71bb) is 8.0M, max 584.8M, 576.8M free. May 13 07:15:06.427098 systemd-journald[933]: Received client request to flush runtime journal. May 13 07:15:06.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.355794 systemd[1]: Finished flatcar-tmpfiles.service. May 13 07:15:06.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.356741 systemd[1]: Finished systemd-random-seed.service. May 13 07:15:06.357379 systemd[1]: Reached target first-boot-complete.target. May 13 07:15:06.429366 udevadm[968]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 13 07:15:06.359262 systemd[1]: Starting systemd-sysusers.service... May 13 07:15:06.376197 systemd[1]: Finished systemd-udev-trigger.service. May 13 07:15:06.378077 systemd[1]: Starting systemd-udev-settle.service... May 13 07:15:06.386734 systemd[1]: Finished systemd-sysctl.service. May 13 07:15:06.428183 systemd[1]: Finished systemd-journal-flush.service. May 13 07:15:06.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:06.458600 systemd[1]: Finished systemd-sysusers.service. May 13 07:15:07.002004 systemd[1]: Finished systemd-hwdb-update.service. May 13 07:15:07.019295 kernel: kauditd_printk_skb: 100 callbacks suppressed May 13 07:15:07.019453 kernel: audit: type=1130 audit(1747120507.002:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.005000 audit: BPF prog-id=21 op=LOAD May 13 07:15:07.020581 systemd[1]: Starting systemd-udevd.service... May 13 07:15:07.023771 kernel: audit: type=1334 audit(1747120507.005:140): prog-id=21 op=LOAD May 13 07:15:07.023899 kernel: audit: type=1334 audit(1747120507.018:141): prog-id=22 op=LOAD May 13 07:15:07.023970 kernel: audit: type=1334 audit(1747120507.018:142): prog-id=7 op=UNLOAD May 13 07:15:07.024021 kernel: audit: type=1334 audit(1747120507.018:143): prog-id=8 op=UNLOAD May 13 07:15:07.018000 audit: BPF prog-id=22 op=LOAD May 13 07:15:07.018000 audit: BPF prog-id=7 op=UNLOAD May 13 07:15:07.018000 audit: BPF prog-id=8 op=UNLOAD May 13 07:15:07.073760 systemd-udevd[970]: Using default interface naming scheme 'v252'. May 13 07:15:07.332289 systemd[1]: Started systemd-udevd.service. May 13 07:15:07.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.357920 kernel: audit: type=1130 audit(1747120507.332:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.360340 systemd[1]: Starting systemd-networkd.service... May 13 07:15:07.334000 audit: BPF prog-id=23 op=LOAD May 13 07:15:07.373906 kernel: audit: type=1334 audit(1747120507.334:145): prog-id=23 op=LOAD May 13 07:15:07.382000 audit: BPF prog-id=24 op=LOAD May 13 07:15:07.387941 kernel: audit: type=1334 audit(1747120507.382:146): prog-id=24 op=LOAD May 13 07:15:07.388815 systemd[1]: Starting systemd-userdbd.service... May 13 07:15:07.386000 audit: BPF prog-id=25 op=LOAD May 13 07:15:07.386000 audit: BPF prog-id=26 op=LOAD May 13 07:15:07.396839 kernel: audit: type=1334 audit(1747120507.386:147): prog-id=25 op=LOAD May 13 07:15:07.397304 kernel: audit: type=1334 audit(1747120507.386:148): prog-id=26 op=LOAD May 13 07:15:07.425049 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 07:15:07.442663 systemd[1]: Started systemd-userdbd.service. May 13 07:15:07.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.491878 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 07:15:07.508499 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 07:15:07.511305 kernel: ACPI: button: Power Button [PWRF] May 13 07:15:07.540485 systemd-networkd[987]: lo: Link UP May 13 07:15:07.540496 systemd-networkd[987]: lo: Gained carrier May 13 07:15:07.527000 audit[994]: AVC avc: denied { confidentiality } for pid=994 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 07:15:07.541950 systemd-networkd[987]: Enumeration completed May 13 07:15:07.542059 systemd[1]: Started systemd-networkd.service. May 13 07:15:07.542260 systemd-networkd[987]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 07:15:07.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.544525 systemd-networkd[987]: eth0: Link UP May 13 07:15:07.544532 systemd-networkd[987]: eth0: Gained carrier May 13 07:15:07.527000 audit[994]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556acab6c5a0 a1=338ac a2=7f2ce13cbbc5 a3=5 items=110 ppid=970 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:07.527000 audit: CWD cwd="/" May 13 07:15:07.527000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=1 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=2 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=3 name=(null) inode=14564 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=4 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=5 name=(null) inode=14565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=6 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=7 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=8 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=9 name=(null) inode=14567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=10 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=11 name=(null) inode=14568 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=12 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=13 name=(null) inode=14569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=14 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=15 name=(null) inode=14570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=16 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=17 name=(null) inode=14571 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=18 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=19 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=20 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=21 name=(null) inode=14573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=22 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=23 name=(null) inode=14574 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=24 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=25 name=(null) inode=14575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=26 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=27 name=(null) inode=14576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=28 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=29 name=(null) inode=14577 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=30 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=31 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=32 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=33 name=(null) inode=14579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=34 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=35 name=(null) inode=14580 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=36 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=37 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=38 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=39 name=(null) inode=14582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=40 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=41 name=(null) inode=14583 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=42 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=43 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=44 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=45 name=(null) inode=14585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=46 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=47 name=(null) inode=14586 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=48 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=49 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=50 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=51 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=52 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=53 name=(null) inode=14589 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=55 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=56 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=57 name=(null) inode=14591 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=58 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=59 name=(null) inode=14592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=60 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=61 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=62 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=63 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=64 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=65 name=(null) inode=14595 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=66 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=67 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=68 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=69 name=(null) inode=14597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=70 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=71 name=(null) inode=14598 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=72 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=73 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=74 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=75 name=(null) inode=14600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=76 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=77 name=(null) inode=14601 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=78 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=79 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=80 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=81 name=(null) inode=14603 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=82 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=83 name=(null) inode=14604 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=84 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=85 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=86 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=87 name=(null) inode=14606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=88 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=89 name=(null) inode=14607 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=90 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=91 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=92 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=93 name=(null) inode=14609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=94 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=95 name=(null) inode=14610 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=96 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=97 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=98 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=99 name=(null) inode=14612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=100 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=101 name=(null) inode=14613 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=102 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=103 name=(null) inode=14614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=104 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=105 name=(null) inode=14615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=106 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=107 name=(null) inode=14616 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PATH item=109 name=(null) inode=14617 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:15:07.527000 audit: PROCTITLE proctitle="(udev-worker)" May 13 07:15:07.556992 systemd-networkd[987]: eth0: DHCPv4 address 172.24.4.235/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 13 07:15:07.573886 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 07:15:07.576866 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 13 07:15:07.583884 kernel: mousedev: PS/2 mouse device common for all mice May 13 07:15:07.629229 systemd[1]: Finished systemd-udev-settle.service. May 13 07:15:07.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.630981 systemd[1]: Starting lvm2-activation-early.service... May 13 07:15:07.659343 lvm[1004]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 07:15:07.686774 systemd[1]: Finished lvm2-activation-early.service. May 13 07:15:07.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.687437 systemd[1]: Reached target cryptsetup.target. May 13 07:15:07.689029 systemd[1]: Starting lvm2-activation.service... May 13 07:15:07.697873 lvm[1005]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 07:15:07.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.737342 systemd[1]: Finished lvm2-activation.service. May 13 07:15:07.737904 systemd[1]: Reached target local-fs-pre.target. May 13 07:15:07.738365 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 07:15:07.738384 systemd[1]: Reached target local-fs.target. May 13 07:15:07.738827 systemd[1]: Reached target machines.target. May 13 07:15:07.740393 systemd[1]: Starting ldconfig.service... May 13 07:15:07.742823 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 07:15:07.742907 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 07:15:07.743969 systemd[1]: Starting systemd-boot-update.service... May 13 07:15:07.745322 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 07:15:07.748004 systemd[1]: Starting systemd-machine-id-commit.service... May 13 07:15:07.753973 systemd[1]: Starting systemd-sysext.service... May 13 07:15:07.761975 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1007 (bootctl) May 13 07:15:07.763247 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 07:15:07.817943 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 07:15:07.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:07.849760 systemd[1]: Unmounting usr-share-oem.mount... May 13 07:15:07.887114 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 07:15:07.887519 systemd[1]: Unmounted usr-share-oem.mount. May 13 07:15:07.930945 kernel: loop0: detected capacity change from 0 to 210664 May 13 07:15:08.067484 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 07:15:08.070046 systemd[1]: Finished systemd-machine-id-commit.service. May 13 07:15:08.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.125898 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 07:15:08.160934 kernel: loop1: detected capacity change from 0 to 210664 May 13 07:15:08.202124 (sd-sysext)[1020]: Using extensions 'kubernetes'. May 13 07:15:08.203019 (sd-sysext)[1020]: Merged extensions into '/usr'. May 13 07:15:08.255405 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:08.262620 systemd[1]: Mounting usr-share-oem.mount... May 13 07:15:08.263406 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 07:15:08.265561 systemd[1]: Starting modprobe@dm_mod.service... May 13 07:15:08.267511 systemd[1]: Starting modprobe@efi_pstore.service... May 13 07:15:08.270572 systemd[1]: Starting modprobe@loop.service... May 13 07:15:08.271208 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 07:15:08.271372 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 07:15:08.271543 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:08.274764 systemd[1]: Mounted usr-share-oem.mount. May 13 07:15:08.277947 systemd[1]: Finished systemd-sysext.service. May 13 07:15:08.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.278781 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 07:15:08.278983 systemd[1]: Finished modprobe@dm_mod.service. May 13 07:15:08.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.280081 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 07:15:08.280207 systemd[1]: Finished modprobe@loop.service. May 13 07:15:08.284079 systemd[1]: Starting ensure-sysext.service... May 13 07:15:08.284825 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 07:15:08.286276 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 07:15:08.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.288555 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 07:15:08.288706 systemd[1]: Finished modprobe@efi_pstore.service. May 13 07:15:08.291812 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 07:15:08.303809 systemd-fsck[1017]: fsck.fat 4.2 (2021-01-31) May 13 07:15:08.303809 systemd-fsck[1017]: /dev/vda1: 790 files, 120692/258078 clusters May 13 07:15:08.304752 systemd[1]: Reloading. May 13 07:15:08.327571 systemd-tmpfiles[1027]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 07:15:08.341208 systemd-tmpfiles[1027]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 07:15:08.364250 systemd-tmpfiles[1027]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 07:15:08.404008 /usr/lib/systemd/system-generators/torcx-generator[1046]: time="2025-05-13T07:15:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 07:15:08.404042 /usr/lib/systemd/system-generators/torcx-generator[1046]: time="2025-05-13T07:15:08Z" level=info msg="torcx already run" May 13 07:15:08.538421 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 07:15:08.538446 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 07:15:08.569834 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 07:15:08.648000 audit: BPF prog-id=27 op=LOAD May 13 07:15:08.648000 audit: BPF prog-id=28 op=LOAD May 13 07:15:08.648000 audit: BPF prog-id=21 op=UNLOAD May 13 07:15:08.648000 audit: BPF prog-id=22 op=UNLOAD May 13 07:15:08.649000 audit: BPF prog-id=29 op=LOAD May 13 07:15:08.649000 audit: BPF prog-id=24 op=UNLOAD May 13 07:15:08.649000 audit: BPF prog-id=30 op=LOAD May 13 07:15:08.649000 audit: BPF prog-id=31 op=LOAD May 13 07:15:08.649000 audit: BPF prog-id=25 op=UNLOAD May 13 07:15:08.649000 audit: BPF prog-id=26 op=UNLOAD May 13 07:15:08.651000 audit: BPF prog-id=32 op=LOAD May 13 07:15:08.651000 audit: BPF prog-id=18 op=UNLOAD May 13 07:15:08.651000 audit: BPF prog-id=33 op=LOAD May 13 07:15:08.651000 audit: BPF prog-id=34 op=LOAD May 13 07:15:08.651000 audit: BPF prog-id=19 op=UNLOAD May 13 07:15:08.651000 audit: BPF prog-id=20 op=UNLOAD May 13 07:15:08.656000 audit: BPF prog-id=35 op=LOAD May 13 07:15:08.656000 audit: BPF prog-id=23 op=UNLOAD May 13 07:15:08.667018 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 07:15:08.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.674677 systemd[1]: Mounting boot.mount... May 13 07:15:08.689093 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:08.689676 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 07:15:08.691196 systemd[1]: Starting modprobe@dm_mod.service... May 13 07:15:08.694051 systemd[1]: Starting modprobe@efi_pstore.service... May 13 07:15:08.696283 systemd[1]: Starting modprobe@loop.service... May 13 07:15:08.697833 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 07:15:08.698081 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 07:15:08.698312 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:08.699317 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 07:15:08.699617 systemd[1]: Finished modprobe@dm_mod.service. May 13 07:15:08.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.702824 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:08.703559 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 07:15:08.706278 systemd[1]: Starting modprobe@dm_mod.service... May 13 07:15:08.707447 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 07:15:08.707708 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 07:15:08.707967 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:08.709520 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 07:15:08.709775 systemd[1]: Finished modprobe@efi_pstore.service. May 13 07:15:08.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.711526 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 07:15:08.711741 systemd[1]: Finished modprobe@loop.service. May 13 07:15:08.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.713021 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 07:15:08.718048 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 07:15:08.718301 systemd[1]: Finished modprobe@dm_mod.service. May 13 07:15:08.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.720658 systemd[1]: Finished ensure-sysext.service. May 13 07:15:08.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.724366 systemd[1]: Mounted boot.mount. May 13 07:15:08.726529 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 07:15:08.735157 systemd[1]: Starting modprobe@drm.service... May 13 07:15:08.737134 systemd[1]: Starting modprobe@efi_pstore.service... May 13 07:15:08.741273 systemd[1]: Starting modprobe@loop.service... May 13 07:15:08.742802 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 07:15:08.742984 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 07:15:08.747015 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 07:15:08.752083 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 07:15:08.752426 systemd[1]: Finished modprobe@drm.service. May 13 07:15:08.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.754277 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 07:15:08.756004 systemd[1]: Finished modprobe@efi_pstore.service. May 13 07:15:08.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.758530 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 07:15:08.762215 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 07:15:08.762350 systemd[1]: Finished modprobe@loop.service. May 13 07:15:08.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.763058 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 07:15:08.775526 systemd[1]: Finished systemd-boot-update.service. May 13 07:15:08.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.802013 ldconfig[1006]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 07:15:08.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.819394 systemd[1]: Finished ldconfig.service. May 13 07:15:08.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.847000 audit: BPF prog-id=36 op=LOAD May 13 07:15:08.841548 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 07:15:08.843402 systemd[1]: Starting audit-rules.service... May 13 07:15:08.845023 systemd[1]: Starting clean-ca-certificates.service... May 13 07:15:08.846616 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 07:15:08.850000 audit: BPF prog-id=37 op=LOAD May 13 07:15:08.850286 systemd[1]: Starting systemd-resolved.service... May 13 07:15:08.854315 systemd[1]: Starting systemd-timesyncd.service... May 13 07:15:08.856011 systemd[1]: Starting systemd-update-utmp.service... May 13 07:15:08.861000 audit[1109]: SYSTEM_BOOT pid=1109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 07:15:08.865459 systemd[1]: Finished systemd-update-utmp.service. May 13 07:15:08.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.873771 systemd[1]: Finished clean-ca-certificates.service. May 13 07:15:08.874530 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 07:15:08.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.885155 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:08.885181 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 07:15:08.887430 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 07:15:08.889513 systemd[1]: Starting systemd-update-done.service... May 13 07:15:08.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.896654 systemd[1]: Finished systemd-update-done.service. May 13 07:15:08.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:08.936855 augenrules[1124]: No rules May 13 07:15:08.935000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 07:15:08.935000 audit[1124]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd3ff15770 a2=420 a3=0 items=0 ppid=1103 pid=1124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:08.935000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 07:15:08.938400 systemd[1]: Finished audit-rules.service. May 13 07:15:08.943740 systemd[1]: Started systemd-timesyncd.service. May 13 07:15:08.944363 systemd[1]: Reached target time-set.target. May 13 07:15:08.952027 systemd-resolved[1107]: Positive Trust Anchors: May 13 07:15:08.952306 systemd-resolved[1107]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 07:15:08.952400 systemd-resolved[1107]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 07:15:08.960552 systemd-resolved[1107]: Using system hostname 'ci-3510-3-7-n-1a4ba3031a.novalocal'. May 13 07:15:09.555424 systemd[1]: Started systemd-resolved.service. May 13 07:15:09.555581 systemd-timesyncd[1108]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). May 13 07:15:09.555831 systemd-timesyncd[1108]: Initial clock synchronization to Tue 2025-05-13 07:15:09.555408 UTC. May 13 07:15:09.555926 systemd-resolved[1107]: Clock change detected. Flushing caches. May 13 07:15:09.556027 systemd[1]: Reached target network.target. May 13 07:15:09.556490 systemd[1]: Reached target nss-lookup.target. May 13 07:15:09.556930 systemd[1]: Reached target sysinit.target. May 13 07:15:09.557518 systemd[1]: Started motdgen.path. May 13 07:15:09.558004 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 07:15:09.558691 systemd[1]: Started logrotate.timer. May 13 07:15:09.559234 systemd[1]: Started mdadm.timer. May 13 07:15:09.559666 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 07:15:09.560118 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 07:15:09.560152 systemd[1]: Reached target paths.target. May 13 07:15:09.560587 systemd[1]: Reached target timers.target. May 13 07:15:09.561355 systemd[1]: Listening on dbus.socket. May 13 07:15:09.563010 systemd[1]: Starting docker.socket... May 13 07:15:09.566839 systemd[1]: Listening on sshd.socket. May 13 07:15:09.567460 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 07:15:09.567865 systemd[1]: Listening on docker.socket. May 13 07:15:09.568387 systemd[1]: Reached target sockets.target. May 13 07:15:09.568825 systemd[1]: Reached target basic.target. May 13 07:15:09.569347 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 07:15:09.569387 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 07:15:09.570501 systemd[1]: Starting containerd.service... May 13 07:15:09.572841 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 13 07:15:09.574548 systemd[1]: Starting dbus.service... May 13 07:15:09.577222 systemd[1]: Starting enable-oem-cloudinit.service... May 13 07:15:09.583025 systemd[1]: Starting extend-filesystems.service... May 13 07:15:09.584945 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 07:15:09.590113 systemd[1]: Starting motdgen.service... May 13 07:15:09.592579 systemd[1]: Starting prepare-helm.service... May 13 07:15:09.597738 jq[1137]: false May 13 07:15:09.595630 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 07:15:09.597205 systemd[1]: Starting sshd-keygen.service... May 13 07:15:09.602844 systemd[1]: Starting systemd-logind.service... May 13 07:15:09.603396 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 07:15:09.603456 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 07:15:09.603880 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 07:15:09.604562 systemd[1]: Starting update-engine.service... May 13 07:15:09.608622 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 07:15:09.612972 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 07:15:09.613187 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 07:15:09.620554 systemd[1]: Created slice system-sshd.slice. May 13 07:15:09.633275 tar[1152]: linux-amd64/helm May 13 07:15:09.635685 jq[1150]: true May 13 07:15:09.640594 systemd[1]: motdgen.service: Deactivated successfully. May 13 07:15:09.640800 systemd[1]: Finished motdgen.service. May 13 07:15:09.649532 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 07:15:09.649749 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 07:15:09.670407 jq[1161]: true May 13 07:15:09.670685 extend-filesystems[1138]: Found loop1 May 13 07:15:09.670685 extend-filesystems[1138]: Found vda May 13 07:15:09.670685 extend-filesystems[1138]: Found vda1 May 13 07:15:09.670685 extend-filesystems[1138]: Found vda2 May 13 07:15:09.670685 extend-filesystems[1138]: Found vda3 May 13 07:15:09.670685 extend-filesystems[1138]: Found usr May 13 07:15:09.670685 extend-filesystems[1138]: Found vda4 May 13 07:15:09.670685 extend-filesystems[1138]: Found vda6 May 13 07:15:09.676496 extend-filesystems[1138]: Found vda7 May 13 07:15:09.676496 extend-filesystems[1138]: Found vda9 May 13 07:15:09.676496 extend-filesystems[1138]: Checking size of /dev/vda9 May 13 07:15:09.699567 dbus-daemon[1134]: [system] SELinux support is enabled May 13 07:15:09.699746 systemd[1]: Started dbus.service. May 13 07:15:09.702358 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 07:15:09.702389 systemd[1]: Reached target system-config.target. May 13 07:15:09.702926 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 07:15:09.702944 systemd[1]: Reached target user-config.target. May 13 07:15:09.713182 extend-filesystems[1138]: Resized partition /dev/vda9 May 13 07:15:09.717133 extend-filesystems[1175]: resize2fs 1.46.5 (30-Dec-2021) May 13 07:15:09.729276 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 13 07:15:09.732275 update_engine[1147]: I0513 07:15:09.730008 1147 main.cc:92] Flatcar Update Engine starting May 13 07:15:09.733366 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 13 07:15:09.744741 systemd[1]: Started update-engine.service. May 13 07:15:09.745015 update_engine[1147]: I0513 07:15:09.744784 1147 update_check_scheduler.cc:74] Next update check in 7m5s May 13 07:15:09.747271 systemd[1]: Started locksmithd.service. May 13 07:15:09.792488 extend-filesystems[1175]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 07:15:09.792488 extend-filesystems[1175]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 07:15:09.792488 extend-filesystems[1175]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 13 07:15:09.796427 extend-filesystems[1138]: Resized filesystem in /dev/vda9 May 13 07:15:09.793321 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 07:15:09.793589 systemd[1]: Finished extend-filesystems.service. May 13 07:15:09.799375 env[1159]: time="2025-05-13T07:15:09.799299966Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 07:15:09.808615 systemd-logind[1146]: Watching system buttons on /dev/input/event1 (Power Button) May 13 07:15:09.808643 systemd-logind[1146]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 07:15:09.812273 bash[1191]: Updated "/home/core/.ssh/authorized_keys" May 13 07:15:09.812603 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 07:15:09.813318 systemd-logind[1146]: New seat seat0. May 13 07:15:09.817233 systemd[1]: Started systemd-logind.service. May 13 07:15:09.863717 env[1159]: time="2025-05-13T07:15:09.863666656Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 07:15:09.864098 env[1159]: time="2025-05-13T07:15:09.864079801Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 07:15:09.865466 env[1159]: time="2025-05-13T07:15:09.865424653Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 07:15:09.865538 env[1159]: time="2025-05-13T07:15:09.865522957Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 07:15:09.865794 env[1159]: time="2025-05-13T07:15:09.865771504Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 07:15:09.865878 env[1159]: time="2025-05-13T07:15:09.865862404Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 07:15:09.865948 env[1159]: time="2025-05-13T07:15:09.865932456Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 07:15:09.866010 env[1159]: time="2025-05-13T07:15:09.865996165Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 07:15:09.866143 env[1159]: time="2025-05-13T07:15:09.866126059Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 07:15:09.866476 env[1159]: time="2025-05-13T07:15:09.866458051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 07:15:09.866650 env[1159]: time="2025-05-13T07:15:09.866629012Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 07:15:09.866713 env[1159]: time="2025-05-13T07:15:09.866698933Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 07:15:09.866818 env[1159]: time="2025-05-13T07:15:09.866800283Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 07:15:09.866889 env[1159]: time="2025-05-13T07:15:09.866875765Z" level=info msg="metadata content store policy set" policy=shared May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.879998777Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880041617Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880057267Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880095699Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880115506Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880132598Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880150572Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880169166Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880186800Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880205495Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880222346Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880239959Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880688681Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 07:15:09.881274 env[1159]: time="2025-05-13T07:15:09.880788398Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 07:15:09.881688 env[1159]: time="2025-05-13T07:15:09.881066429Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 07:15:09.881688 env[1159]: time="2025-05-13T07:15:09.881094241Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 07:15:09.881688 env[1159]: time="2025-05-13T07:15:09.881111133Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 07:15:09.881688 env[1159]: time="2025-05-13T07:15:09.881164273Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 07:15:09.881688 env[1159]: time="2025-05-13T07:15:09.881183329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 07:15:09.881688 env[1159]: time="2025-05-13T07:15:09.881198747Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 07:15:09.881688 env[1159]: time="2025-05-13T07:15:09.881212293Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 07:15:09.881688 env[1159]: time="2025-05-13T07:15:09.881226039Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.881240426Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882575309Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882591780Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882629090Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882821992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882840677Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882856276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882890340Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882914325Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882927319Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.882948058Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 07:15:09.884697 env[1159]: time="2025-05-13T07:15:09.883014303Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.883298125Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.883384286Z" level=info msg="Connect containerd service" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.883437556Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884172966Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884284264Z" level=info msg="Start subscribing containerd event" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884368572Z" level=info msg="Start recovering state" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884445948Z" level=info msg="Start event monitor" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884464372Z" level=info msg="Start snapshots syncer" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884486864Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884487365Z" level=info msg="Start cni network conf syncer for default" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884575821Z" level=info msg="Start streaming server" May 13 07:15:09.885038 env[1159]: time="2025-05-13T07:15:09.884563628Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 07:15:09.888127 env[1159]: time="2025-05-13T07:15:09.885209590Z" level=info msg="containerd successfully booted in 0.124640s" May 13 07:15:09.885335 systemd[1]: Started containerd.service. May 13 07:15:10.077437 systemd-networkd[987]: eth0: Gained IPv6LL May 13 07:15:10.079447 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 07:15:10.080280 systemd[1]: Reached target network-online.target. May 13 07:15:10.082682 systemd[1]: Starting kubelet.service... May 13 07:15:10.403922 tar[1152]: linux-amd64/LICENSE May 13 07:15:10.403922 tar[1152]: linux-amd64/README.md May 13 07:15:10.408623 systemd[1]: Finished prepare-helm.service. May 13 07:15:10.420431 locksmithd[1187]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 07:15:11.967030 systemd[1]: Started kubelet.service. May 13 07:15:11.970470 sshd_keygen[1160]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 07:15:11.997523 systemd[1]: Finished sshd-keygen.service. May 13 07:15:12.001912 systemd[1]: Starting issuegen.service... May 13 07:15:12.006556 systemd[1]: Started sshd@0-172.24.4.235:22-172.24.4.1:58606.service. May 13 07:15:12.012478 systemd[1]: issuegen.service: Deactivated successfully. May 13 07:15:12.012847 systemd[1]: Finished issuegen.service. May 13 07:15:12.017293 systemd[1]: Starting systemd-user-sessions.service... May 13 07:15:12.025657 systemd[1]: Finished systemd-user-sessions.service. May 13 07:15:12.027848 systemd[1]: Started getty@tty1.service. May 13 07:15:12.029492 systemd[1]: Started serial-getty@ttyS0.service. May 13 07:15:12.030115 systemd[1]: Reached target getty.target. May 13 07:15:13.082136 sshd[1216]: Accepted publickey for core from 172.24.4.1 port 58606 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:13.086711 sshd[1216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:13.122740 systemd[1]: Created slice user-500.slice. May 13 07:15:13.127181 systemd[1]: Starting user-runtime-dir@500.service... May 13 07:15:13.127867 systemd-logind[1146]: New session 1 of user core. May 13 07:15:13.150486 systemd[1]: Finished user-runtime-dir@500.service. May 13 07:15:13.154607 systemd[1]: Starting user@500.service... May 13 07:15:13.161934 (systemd)[1230]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:13.268976 systemd[1230]: Queued start job for default target default.target. May 13 07:15:13.270338 systemd[1230]: Reached target paths.target. May 13 07:15:13.270465 systemd[1230]: Reached target sockets.target. May 13 07:15:13.270559 systemd[1230]: Reached target timers.target. May 13 07:15:13.270661 systemd[1230]: Reached target basic.target. May 13 07:15:13.270819 systemd[1]: Started user@500.service. May 13 07:15:13.271430 systemd[1230]: Reached target default.target. May 13 07:15:13.271503 systemd[1230]: Startup finished in 101ms. May 13 07:15:13.272268 systemd[1]: Started session-1.scope. May 13 07:15:13.743965 kubelet[1207]: E0513 07:15:13.743926 1207 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 07:15:13.749147 systemd[1]: Started sshd@1-172.24.4.235:22-172.24.4.1:58342.service. May 13 07:15:13.753384 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 07:15:13.753518 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 07:15:13.753727 systemd[1]: kubelet.service: Consumed 1.918s CPU time. May 13 07:15:15.890708 sshd[1239]: Accepted publickey for core from 172.24.4.1 port 58342 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:15.893346 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:15.903750 systemd-logind[1146]: New session 2 of user core. May 13 07:15:15.904518 systemd[1]: Started session-2.scope. May 13 07:15:16.693814 coreos-metadata[1133]: May 13 07:15:16.693 WARN failed to locate config-drive, using the metadata service API instead May 13 07:15:16.727063 sshd[1239]: pam_unix(sshd:session): session closed for user core May 13 07:15:16.737230 systemd[1]: Started sshd@2-172.24.4.235:22-172.24.4.1:58352.service. May 13 07:15:16.742517 systemd[1]: sshd@1-172.24.4.235:22-172.24.4.1:58342.service: Deactivated successfully. May 13 07:15:16.744014 systemd[1]: session-2.scope: Deactivated successfully. May 13 07:15:16.748616 systemd-logind[1146]: Session 2 logged out. Waiting for processes to exit. May 13 07:15:16.754418 systemd-logind[1146]: Removed session 2. May 13 07:15:16.791364 coreos-metadata[1133]: May 13 07:15:16.791 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 13 07:15:17.069909 coreos-metadata[1133]: May 13 07:15:17.069 INFO Fetch successful May 13 07:15:17.070206 coreos-metadata[1133]: May 13 07:15:17.070 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 13 07:15:17.086665 coreos-metadata[1133]: May 13 07:15:17.086 INFO Fetch successful May 13 07:15:17.091676 unknown[1133]: wrote ssh authorized keys file for user: core May 13 07:15:17.125143 update-ssh-keys[1249]: Updated "/home/core/.ssh/authorized_keys" May 13 07:15:17.126022 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 13 07:15:17.126894 systemd[1]: Reached target multi-user.target. May 13 07:15:17.129839 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 07:15:17.146794 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 07:15:17.147122 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 07:15:17.148138 systemd[1]: Startup finished in 1.027s (kernel) + 8.378s (initrd) + 14.546s (userspace) = 23.952s. May 13 07:15:18.251057 sshd[1246]: Accepted publickey for core from 172.24.4.1 port 58352 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:18.253961 sshd[1246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:18.264521 systemd-logind[1146]: New session 3 of user core. May 13 07:15:18.265232 systemd[1]: Started session-3.scope. May 13 07:15:18.943233 sshd[1246]: pam_unix(sshd:session): session closed for user core May 13 07:15:18.952619 systemd[1]: sshd@2-172.24.4.235:22-172.24.4.1:58352.service: Deactivated successfully. May 13 07:15:18.953404 systemd-logind[1146]: Session 3 logged out. Waiting for processes to exit. May 13 07:15:18.955118 systemd[1]: session-3.scope: Deactivated successfully. May 13 07:15:18.958098 systemd-logind[1146]: Removed session 3. May 13 07:15:23.886779 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 07:15:23.887236 systemd[1]: Stopped kubelet.service. May 13 07:15:23.887370 systemd[1]: kubelet.service: Consumed 1.918s CPU time. May 13 07:15:23.890147 systemd[1]: Starting kubelet.service... May 13 07:15:24.116798 systemd[1]: Started kubelet.service. May 13 07:15:24.369649 kubelet[1258]: E0513 07:15:24.368606 1258 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 07:15:24.377106 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 07:15:24.377465 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 07:15:28.953019 systemd[1]: Started sshd@3-172.24.4.235:22-172.24.4.1:33760.service. May 13 07:15:30.475451 sshd[1266]: Accepted publickey for core from 172.24.4.1 port 33760 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:30.478861 sshd[1266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:30.489817 systemd[1]: Started session-4.scope. May 13 07:15:30.491541 systemd-logind[1146]: New session 4 of user core. May 13 07:15:31.311182 sshd[1266]: pam_unix(sshd:session): session closed for user core May 13 07:15:31.317650 systemd[1]: Started sshd@4-172.24.4.235:22-172.24.4.1:33770.service. May 13 07:15:31.322062 systemd[1]: sshd@3-172.24.4.235:22-172.24.4.1:33760.service: Deactivated successfully. May 13 07:15:31.323538 systemd[1]: session-4.scope: Deactivated successfully. May 13 07:15:31.325906 systemd-logind[1146]: Session 4 logged out. Waiting for processes to exit. May 13 07:15:31.328357 systemd-logind[1146]: Removed session 4. May 13 07:15:32.803147 sshd[1271]: Accepted publickey for core from 172.24.4.1 port 33770 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:32.806242 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:32.815829 systemd-logind[1146]: New session 5 of user core. May 13 07:15:32.816695 systemd[1]: Started session-5.scope. May 13 07:15:33.579561 sshd[1271]: pam_unix(sshd:session): session closed for user core May 13 07:15:33.586177 systemd[1]: Started sshd@5-172.24.4.235:22-172.24.4.1:50848.service. May 13 07:15:33.587336 systemd[1]: sshd@4-172.24.4.235:22-172.24.4.1:33770.service: Deactivated successfully. May 13 07:15:33.588688 systemd[1]: session-5.scope: Deactivated successfully. May 13 07:15:33.591783 systemd-logind[1146]: Session 5 logged out. Waiting for processes to exit. May 13 07:15:33.594692 systemd-logind[1146]: Removed session 5. May 13 07:15:34.386671 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 07:15:34.387111 systemd[1]: Stopped kubelet.service. May 13 07:15:34.389968 systemd[1]: Starting kubelet.service... May 13 07:15:34.665359 systemd[1]: Started kubelet.service. May 13 07:15:34.760609 kubelet[1284]: E0513 07:15:34.760527 1284 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 07:15:34.764745 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 07:15:34.765041 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 07:15:35.085208 sshd[1277]: Accepted publickey for core from 172.24.4.1 port 50848 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:35.087944 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:35.097207 systemd-logind[1146]: New session 6 of user core. May 13 07:15:35.099390 systemd[1]: Started session-6.scope. May 13 07:15:35.727881 sshd[1277]: pam_unix(sshd:session): session closed for user core May 13 07:15:35.735656 systemd[1]: Started sshd@6-172.24.4.235:22-172.24.4.1:50850.service. May 13 07:15:35.736917 systemd[1]: sshd@5-172.24.4.235:22-172.24.4.1:50848.service: Deactivated successfully. May 13 07:15:35.738387 systemd[1]: session-6.scope: Deactivated successfully. May 13 07:15:35.742894 systemd-logind[1146]: Session 6 logged out. Waiting for processes to exit. May 13 07:15:35.745618 systemd-logind[1146]: Removed session 6. May 13 07:15:37.318203 sshd[1293]: Accepted publickey for core from 172.24.4.1 port 50850 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:37.323125 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:37.334197 systemd[1]: Started session-7.scope. May 13 07:15:37.338031 systemd-logind[1146]: New session 7 of user core. May 13 07:15:37.911970 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 07:15:37.912618 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 07:15:37.926666 dbus-daemon[1134]: \xd0\u000do\xffQV: received setenforce notice (enforcing=-569363056) May 13 07:15:37.928598 sudo[1297]: pam_unix(sudo:session): session closed for user root May 13 07:15:38.100854 sshd[1293]: pam_unix(sshd:session): session closed for user core May 13 07:15:38.107207 systemd[1]: Started sshd@7-172.24.4.235:22-172.24.4.1:50864.service. May 13 07:15:38.111529 systemd[1]: sshd@6-172.24.4.235:22-172.24.4.1:50850.service: Deactivated successfully. May 13 07:15:38.113221 systemd[1]: session-7.scope: Deactivated successfully. May 13 07:15:38.116514 systemd-logind[1146]: Session 7 logged out. Waiting for processes to exit. May 13 07:15:38.118974 systemd-logind[1146]: Removed session 7. May 13 07:15:39.515702 sshd[1300]: Accepted publickey for core from 172.24.4.1 port 50864 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:39.518806 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:39.528793 systemd-logind[1146]: New session 8 of user core. May 13 07:15:39.529564 systemd[1]: Started session-8.scope. May 13 07:15:40.010677 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 07:15:40.011192 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 07:15:40.017082 sudo[1305]: pam_unix(sudo:session): session closed for user root May 13 07:15:40.027573 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 07:15:40.028668 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 07:15:40.050476 systemd[1]: Stopping audit-rules.service... May 13 07:15:40.050000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 07:15:40.053074 auditctl[1308]: No rules May 13 07:15:40.055597 kernel: kauditd_printk_skb: 175 callbacks suppressed May 13 07:15:40.055817 kernel: audit: type=1305 audit(1747120540.050:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 07:15:40.056435 systemd[1]: audit-rules.service: Deactivated successfully. May 13 07:15:40.056776 systemd[1]: Stopped audit-rules.service. May 13 07:15:40.050000 audit[1308]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf8d6b100 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:40.067442 systemd[1]: Starting audit-rules.service... May 13 07:15:40.081794 kernel: audit: type=1300 audit(1747120540.050:209): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf8d6b100 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:40.050000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 07:15:40.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:40.098179 kernel: audit: type=1327 audit(1747120540.050:209): proctitle=2F7362696E2F617564697463746C002D44 May 13 07:15:40.098355 kernel: audit: type=1131 audit(1747120540.055:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:40.117045 augenrules[1325]: No rules May 13 07:15:40.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:40.118401 systemd[1]: Finished audit-rules.service. May 13 07:15:40.119916 sudo[1304]: pam_unix(sudo:session): session closed for user root May 13 07:15:40.133339 kernel: audit: type=1130 audit(1747120540.117:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:40.133479 kernel: audit: type=1106 audit(1747120540.118:212): pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:15:40.118000 audit[1304]: USER_END pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:15:40.118000 audit[1304]: CRED_DISP pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:15:40.158279 kernel: audit: type=1104 audit(1747120540.118:213): pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:15:40.276547 sshd[1300]: pam_unix(sshd:session): session closed for user core May 13 07:15:40.281000 audit[1300]: USER_END pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:15:40.287413 systemd[1]: Started sshd@8-172.24.4.235:22-172.24.4.1:50868.service. May 13 07:15:40.288503 systemd[1]: sshd@7-172.24.4.235:22-172.24.4.1:50864.service: Deactivated successfully. May 13 07:15:40.289808 systemd[1]: session-8.scope: Deactivated successfully. May 13 07:15:40.302309 kernel: audit: type=1106 audit(1747120540.281:214): pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:15:40.282000 audit[1300]: CRED_DISP pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:15:40.318141 systemd-logind[1146]: Session 8 logged out. Waiting for processes to exit. May 13 07:15:40.318430 kernel: audit: type=1104 audit(1747120540.282:215): pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:15:40.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.235:22-172.24.4.1:50868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:40.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.235:22-172.24.4.1:50864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:40.332313 kernel: audit: type=1130 audit(1747120540.284:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.235:22-172.24.4.1:50868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:40.332916 systemd-logind[1146]: Removed session 8. May 13 07:15:41.630000 audit[1330]: USER_ACCT pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:15:41.632130 sshd[1330]: Accepted publickey for core from 172.24.4.1 port 50868 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:15:41.632000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:15:41.633000 audit[1330]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4f0fdaf0 a2=3 a3=0 items=0 ppid=1 pid=1330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:41.633000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:15:41.635517 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:15:41.646847 systemd[1]: Started session-9.scope. May 13 07:15:41.648669 systemd-logind[1146]: New session 9 of user core. May 13 07:15:41.660000 audit[1330]: USER_START pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:15:41.663000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:15:42.038000 audit[1334]: USER_ACCT pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:15:42.040281 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 07:15:42.039000 audit[1334]: CRED_REFR pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:15:42.041575 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 07:15:42.044000 audit[1334]: USER_START pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:15:42.140300 systemd[1]: Starting docker.service... May 13 07:15:42.239020 env[1344]: time="2025-05-13T07:15:42.238974642Z" level=info msg="Starting up" May 13 07:15:42.241586 env[1344]: time="2025-05-13T07:15:42.241222182Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 07:15:42.241586 env[1344]: time="2025-05-13T07:15:42.241373360Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 07:15:42.241586 env[1344]: time="2025-05-13T07:15:42.241416620Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 07:15:42.241586 env[1344]: time="2025-05-13T07:15:42.241441015Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 07:15:42.245146 env[1344]: time="2025-05-13T07:15:42.245119678Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 07:15:42.245286 env[1344]: time="2025-05-13T07:15:42.245271016Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 07:15:42.245385 env[1344]: time="2025-05-13T07:15:42.245367595Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 07:15:42.245451 env[1344]: time="2025-05-13T07:15:42.245437333Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 07:15:42.253054 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3633148118-merged.mount: Deactivated successfully. May 13 07:15:42.311735 env[1344]: time="2025-05-13T07:15:42.311652612Z" level=info msg="Loading containers: start." May 13 07:15:42.398000 audit[1374]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.398000 audit[1374]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe9a5e1250 a2=0 a3=7ffe9a5e123c items=0 ppid=1344 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 07:15:42.401000 audit[1376]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.401000 audit[1376]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffedb0896b0 a2=0 a3=7ffedb08969c items=0 ppid=1344 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.401000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 07:15:42.404000 audit[1378]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.404000 audit[1378]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffca740e220 a2=0 a3=7ffca740e20c items=0 ppid=1344 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.404000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 07:15:42.408000 audit[1380]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.408000 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff6ed4ea30 a2=0 a3=7fff6ed4ea1c items=0 ppid=1344 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.408000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 07:15:42.412000 audit[1382]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.412000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe388254d0 a2=0 a3=7ffe388254bc items=0 ppid=1344 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.412000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 07:15:42.436000 audit[1387]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.436000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcda75fdc0 a2=0 a3=7ffcda75fdac items=0 ppid=1344 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 07:15:42.454000 audit[1389]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.454000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd8a99260 a2=0 a3=7fffd8a9924c items=0 ppid=1344 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.454000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 07:15:42.458000 audit[1391]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.458000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcff011510 a2=0 a3=7ffcff0114fc items=0 ppid=1344 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 07:15:42.463000 audit[1393]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.463000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe902d2590 a2=0 a3=7ffe902d257c items=0 ppid=1344 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 07:15:42.489000 audit[1397]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.489000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe63334900 a2=0 a3=7ffe633348ec items=0 ppid=1344 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 07:15:42.494000 audit[1398]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.494000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe0ba8f290 a2=0 a3=7ffe0ba8f27c items=0 ppid=1344 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 07:15:42.524324 kernel: Initializing XFRM netlink socket May 13 07:15:42.604556 env[1344]: time="2025-05-13T07:15:42.604468717Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 07:15:42.631000 audit[1407]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.631000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd5bd45880 a2=0 a3=7ffd5bd4586c items=0 ppid=1344 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.631000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 07:15:42.657000 audit[1410]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.657000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd59bacf50 a2=0 a3=7ffd59bacf3c items=0 ppid=1344 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 07:15:42.667000 audit[1413]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.667000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcfe4a4a70 a2=0 a3=7ffcfe4a4a5c items=0 ppid=1344 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 07:15:42.674000 audit[1415]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.674000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff6ddf22c0 a2=0 a3=7fff6ddf22ac items=0 ppid=1344 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 07:15:42.679000 audit[1417]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.679000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcd29d8030 a2=0 a3=7ffcd29d801c items=0 ppid=1344 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 07:15:42.685000 audit[1419]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.685000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdd6102ed0 a2=0 a3=7ffdd6102ebc items=0 ppid=1344 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 07:15:42.688000 audit[1421]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.688000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe3950ea70 a2=0 a3=7ffe3950ea5c items=0 ppid=1344 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 07:15:42.699000 audit[1424]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.699000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff19fb5470 a2=0 a3=7fff19fb545c items=0 ppid=1344 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.699000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 07:15:42.701000 audit[1426]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.701000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff3bc9b540 a2=0 a3=7fff3bc9b52c items=0 ppid=1344 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.701000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 07:15:42.703000 audit[1428]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.703000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe6ac42d40 a2=0 a3=7ffe6ac42d2c items=0 ppid=1344 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.703000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 07:15:42.705000 audit[1430]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.705000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe34a31c10 a2=0 a3=7ffe34a31bfc items=0 ppid=1344 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.705000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 07:15:42.707351 systemd-networkd[987]: docker0: Link UP May 13 07:15:42.724000 audit[1434]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.724000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd92de0b00 a2=0 a3=7ffd92de0aec items=0 ppid=1344 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 07:15:42.729000 audit[1435]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:15:42.729000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe7d844270 a2=0 a3=7ffe7d84425c items=0 ppid=1344 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:15:42.729000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 07:15:42.731076 env[1344]: time="2025-05-13T07:15:42.731003539Z" level=info msg="Loading containers: done." May 13 07:15:42.752022 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2354356858-merged.mount: Deactivated successfully. May 13 07:15:42.764083 env[1344]: time="2025-05-13T07:15:42.763952481Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 07:15:42.764293 env[1344]: time="2025-05-13T07:15:42.764150256Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 07:15:42.764398 env[1344]: time="2025-05-13T07:15:42.764306635Z" level=info msg="Daemon has completed initialization" May 13 07:15:42.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:42.797474 systemd[1]: Started docker.service. May 13 07:15:42.818049 env[1344]: time="2025-05-13T07:15:42.817653976Z" level=info msg="API listen on /run/docker.sock" May 13 07:15:44.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:44.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:44.886693 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 13 07:15:44.887128 systemd[1]: Stopped kubelet.service. May 13 07:15:44.891342 systemd[1]: Starting kubelet.service... May 13 07:15:44.996076 env[1159]: time="2025-05-13T07:15:44.995991008Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 13 07:15:45.144874 kernel: kauditd_printk_skb: 86 callbacks suppressed May 13 07:15:45.145020 kernel: audit: type=1130 audit(1747120545.139:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:45.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:45.140333 systemd[1]: Started kubelet.service. May 13 07:15:45.194970 kubelet[1477]: E0513 07:15:45.194933 1477 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 07:15:45.196946 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 07:15:45.197078 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 07:15:45.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 07:15:45.202283 kernel: audit: type=1131 audit(1747120545.196:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 07:15:45.822076 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2348374021.mount: Deactivated successfully. May 13 07:15:48.539189 env[1159]: time="2025-05-13T07:15:48.539016619Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:48.543203 env[1159]: time="2025-05-13T07:15:48.543130352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:48.547937 env[1159]: time="2025-05-13T07:15:48.547866952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:48.552400 env[1159]: time="2025-05-13T07:15:48.552331987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:48.554843 env[1159]: time="2025-05-13T07:15:48.554780481Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 13 07:15:48.576324 env[1159]: time="2025-05-13T07:15:48.576174069Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 13 07:15:51.308728 env[1159]: time="2025-05-13T07:15:51.308635707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:51.311912 env[1159]: time="2025-05-13T07:15:51.311858370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:51.316125 env[1159]: time="2025-05-13T07:15:51.316074387Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:51.318885 env[1159]: time="2025-05-13T07:15:51.318825241Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:51.321324 env[1159]: time="2025-05-13T07:15:51.321227678Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 13 07:15:51.343397 env[1159]: time="2025-05-13T07:15:51.343311034Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 13 07:15:53.354946 env[1159]: time="2025-05-13T07:15:53.354862897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:53.368124 env[1159]: time="2025-05-13T07:15:53.368065628Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:53.377178 env[1159]: time="2025-05-13T07:15:53.377061049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:53.383644 env[1159]: time="2025-05-13T07:15:53.383586944Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:53.385683 env[1159]: time="2025-05-13T07:15:53.385621371Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 13 07:15:53.409741 env[1159]: time="2025-05-13T07:15:53.409677652Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 13 07:15:54.921429 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1710713846.mount: Deactivated successfully. May 13 07:15:55.198758 update_engine[1147]: I0513 07:15:55.197489 1147 update_attempter.cc:509] Updating boot flags... May 13 07:15:55.386061 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 13 07:15:55.386304 systemd[1]: Stopped kubelet.service. May 13 07:15:55.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:55.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:55.390541 systemd[1]: Starting kubelet.service... May 13 07:15:55.397365 kernel: audit: type=1130 audit(1747120555.386:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:55.397483 kernel: audit: type=1131 audit(1747120555.386:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:55.799054 systemd[1]: Started kubelet.service. May 13 07:15:55.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:55.805265 kernel: audit: type=1130 audit(1747120555.798:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:15:55.882287 kubelet[1521]: E0513 07:15:55.882227 1521 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 07:15:55.884162 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 07:15:55.884314 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 07:15:55.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 07:15:55.890269 kernel: audit: type=1131 audit(1747120555.884:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 07:15:55.987097 env[1159]: time="2025-05-13T07:15:55.987051312Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:55.990847 env[1159]: time="2025-05-13T07:15:55.990822256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:55.993990 env[1159]: time="2025-05-13T07:15:55.993968658Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:55.996922 env[1159]: time="2025-05-13T07:15:55.996899197Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:55.998190 env[1159]: time="2025-05-13T07:15:55.998086017Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 13 07:15:56.015388 env[1159]: time="2025-05-13T07:15:56.014841543Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 13 07:15:56.697736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3480291304.mount: Deactivated successfully. May 13 07:15:59.600781 env[1159]: time="2025-05-13T07:15:59.600673202Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:59.639235 env[1159]: time="2025-05-13T07:15:59.639166761Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:59.658160 env[1159]: time="2025-05-13T07:15:59.658058067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:59.675659 env[1159]: time="2025-05-13T07:15:59.675599344Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:15:59.678192 env[1159]: time="2025-05-13T07:15:59.678085102Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 13 07:15:59.710881 env[1159]: time="2025-05-13T07:15:59.710812703Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 13 07:16:00.490792 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3960628366.mount: Deactivated successfully. May 13 07:16:00.506151 env[1159]: time="2025-05-13T07:16:00.506016093Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:00.511406 env[1159]: time="2025-05-13T07:16:00.511332866Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:00.515083 env[1159]: time="2025-05-13T07:16:00.515012053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:00.518432 env[1159]: time="2025-05-13T07:16:00.518366123Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:00.520057 env[1159]: time="2025-05-13T07:16:00.519973523Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 13 07:16:00.556686 env[1159]: time="2025-05-13T07:16:00.556605510Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 13 07:16:01.210372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount409793124.mount: Deactivated successfully. May 13 07:16:05.097893 env[1159]: time="2025-05-13T07:16:05.097848195Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:05.101135 env[1159]: time="2025-05-13T07:16:05.101101154Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:05.105070 env[1159]: time="2025-05-13T07:16:05.105048771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:05.109102 env[1159]: time="2025-05-13T07:16:05.109079846Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:05.111418 env[1159]: time="2025-05-13T07:16:05.111328017Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 13 07:16:05.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:05.886741 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 13 07:16:05.899510 kernel: audit: type=1130 audit(1747120565.886:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:05.887209 systemd[1]: Stopped kubelet.service. May 13 07:16:05.900876 systemd[1]: Starting kubelet.service... May 13 07:16:05.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:05.910367 kernel: audit: type=1131 audit(1747120565.887:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:06.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:06.195096 systemd[1]: Started kubelet.service. May 13 07:16:06.200326 kernel: audit: type=1130 audit(1747120566.195:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:06.264142 kubelet[1609]: E0513 07:16:06.264104 1609 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 07:16:06.265534 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 07:16:06.265657 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 07:16:06.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 07:16:06.271263 kernel: audit: type=1131 audit(1747120566.265:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 07:16:09.135941 systemd[1]: Stopped kubelet.service. May 13 07:16:09.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:09.149957 systemd[1]: Starting kubelet.service... May 13 07:16:09.150273 kernel: audit: type=1130 audit(1747120569.136:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:09.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:09.171336 kernel: audit: type=1131 audit(1747120569.136:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:09.191686 systemd[1]: Reloading. May 13 07:16:09.302708 /usr/lib/systemd/system-generators/torcx-generator[1640]: time="2025-05-13T07:16:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 07:16:09.302739 /usr/lib/systemd/system-generators/torcx-generator[1640]: time="2025-05-13T07:16:09Z" level=info msg="torcx already run" May 13 07:16:09.423150 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 07:16:09.423171 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 07:16:09.447149 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 07:16:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528413 kernel: audit: type=1400 audit(1747120569.514:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.531939 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 07:16:09.532038 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 13 07:16:09.532088 kernel: audit: backlog limit exceeded May 13 07:16:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit: BPF prog-id=43 op=LOAD May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit: BPF prog-id=44 op=LOAD May 13 07:16:09.527000 audit: BPF prog-id=27 op=UNLOAD May 13 07:16:09.527000 audit: BPF prog-id=28 op=UNLOAD May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.527000 audit: BPF prog-id=45 op=LOAD May 13 07:16:09.527000 audit: BPF prog-id=37 op=UNLOAD May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit: BPF prog-id=46 op=LOAD May 13 07:16:09.528000 audit: BPF prog-id=29 op=UNLOAD May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit: BPF prog-id=47 op=LOAD May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.528000 audit: BPF prog-id=48 op=LOAD May 13 07:16:09.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.540000 audit: BPF prog-id=54 op=LOAD May 13 07:16:09.540000 audit: BPF prog-id=35 op=UNLOAD May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit: BPF prog-id=55 op=LOAD May 13 07:16:09.541000 audit: BPF prog-id=38 op=UNLOAD May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit: BPF prog-id=56 op=LOAD May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:09.541000 audit: BPF prog-id=57 op=LOAD May 13 07:16:09.541000 audit: BPF prog-id=39 op=UNLOAD May 13 07:16:09.541000 audit: BPF prog-id=40 op=UNLOAD May 13 07:16:09.559802 systemd[1]: Started kubelet.service. May 13 07:16:09.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:09.566399 systemd[1]: Stopping kubelet.service... May 13 07:16:09.567894 systemd[1]: kubelet.service: Deactivated successfully. May 13 07:16:09.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:09.568048 systemd[1]: Stopped kubelet.service. May 13 07:16:09.569881 systemd[1]: Starting kubelet.service... May 13 07:16:09.663109 systemd[1]: Started kubelet.service. May 13 07:16:09.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:10.119176 kubelet[1700]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 07:16:10.119176 kubelet[1700]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 07:16:10.119176 kubelet[1700]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 07:16:10.143941 kubelet[1700]: I0513 07:16:10.143787 1700 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 07:16:10.974712 kubelet[1700]: I0513 07:16:10.974644 1700 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 13 07:16:10.974712 kubelet[1700]: I0513 07:16:10.974676 1700 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 07:16:10.975100 kubelet[1700]: I0513 07:16:10.974873 1700 server.go:927] "Client rotation is on, will bootstrap in background" May 13 07:16:10.999805 kubelet[1700]: I0513 07:16:10.999516 1700 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 07:16:11.004790 kubelet[1700]: E0513 07:16:11.004754 1700 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.235:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.020806 kubelet[1700]: I0513 07:16:11.020758 1700 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 07:16:11.021574 kubelet[1700]: I0513 07:16:11.021524 1700 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 07:16:11.022143 kubelet[1700]: I0513 07:16:11.021725 1700 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-1a4ba3031a.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 13 07:16:11.022523 kubelet[1700]: I0513 07:16:11.022495 1700 topology_manager.go:138] "Creating topology manager with none policy" May 13 07:16:11.022688 kubelet[1700]: I0513 07:16:11.022667 1700 container_manager_linux.go:301] "Creating device plugin manager" May 13 07:16:11.023015 kubelet[1700]: I0513 07:16:11.022987 1700 state_mem.go:36] "Initialized new in-memory state store" May 13 07:16:11.025326 kubelet[1700]: I0513 07:16:11.025295 1700 kubelet.go:400] "Attempting to sync node with API server" May 13 07:16:11.025517 kubelet[1700]: I0513 07:16:11.025492 1700 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 07:16:11.026024 kubelet[1700]: I0513 07:16:11.025999 1700 kubelet.go:312] "Adding apiserver pod source" May 13 07:16:11.026215 kubelet[1700]: I0513 07:16:11.026190 1700 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 07:16:11.042523 kubelet[1700]: W0513 07:16:11.025849 1700 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.235:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-1a4ba3031a.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.042775 kubelet[1700]: E0513 07:16:11.042745 1700 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.235:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-1a4ba3031a.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.049132 kubelet[1700]: W0513 07:16:11.049052 1700 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.235:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.049445 kubelet[1700]: E0513 07:16:11.049416 1700 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.235:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.050829 kubelet[1700]: I0513 07:16:11.050790 1700 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 07:16:11.055002 kubelet[1700]: I0513 07:16:11.054972 1700 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 07:16:11.055296 kubelet[1700]: W0513 07:16:11.055226 1700 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 07:16:11.057311 kubelet[1700]: I0513 07:16:11.057283 1700 server.go:1264] "Started kubelet" May 13 07:16:11.064691 kubelet[1700]: I0513 07:16:11.064628 1700 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 07:16:11.065970 kubelet[1700]: I0513 07:16:11.065551 1700 server.go:455] "Adding debug handlers to kubelet server" May 13 07:16:11.067793 kubelet[1700]: I0513 07:16:11.067692 1700 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 07:16:11.068988 kubelet[1700]: I0513 07:16:11.068953 1700 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 07:16:11.085264 kernel: kauditd_printk_skb: 291 callbacks suppressed May 13 07:16:11.085376 kernel: audit: type=1400 audit(1747120571.070:380): avc: denied { mac_admin } for pid=1700 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:11.070000 audit[1700]: AVC avc: denied { mac_admin } for pid=1700 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:11.085476 kubelet[1700]: I0513 07:16:11.070624 1700 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 07:16:11.085476 kubelet[1700]: I0513 07:16:11.070659 1700 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 07:16:11.085476 kubelet[1700]: I0513 07:16:11.070715 1700 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 07:16:11.085476 kubelet[1700]: I0513 07:16:11.079635 1700 volume_manager.go:291] "Starting Kubelet Volume Manager" May 13 07:16:11.085476 kubelet[1700]: I0513 07:16:11.081722 1700 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 07:16:11.085476 kubelet[1700]: I0513 07:16:11.081771 1700 reconciler.go:26] "Reconciler: start to sync state" May 13 07:16:11.070000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 07:16:11.095612 kernel: audit: type=1401 audit(1747120571.070:380): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 07:16:11.095678 kernel: audit: type=1300 audit(1747120571.070:380): arch=c000003e syscall=188 success=no exit=-22 a0=c000c2a990 a1=c000c36510 a2=c000c2a960 a3=25 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.070000 audit[1700]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c2a990 a1=c000c36510 a2=c000c2a960 a3=25 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 07:16:11.117473 kernel: audit: type=1327 audit(1747120571.070:380): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 07:16:11.117535 kernel: audit: type=1400 audit(1747120571.070:381): avc: denied { mac_admin } for pid=1700 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:11.070000 audit[1700]: AVC avc: denied { mac_admin } for pid=1700 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:11.118901 kubelet[1700]: E0513 07:16:11.118789 1700 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.235:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.235:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-n-1a4ba3031a.novalocal.183f04e719a43a96 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-1a4ba3031a.novalocal,UID:ci-3510-3-7-n-1a4ba3031a.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-1a4ba3031a.novalocal,},FirstTimestamp:2025-05-13 07:16:11.057191574 +0000 UTC m=+1.390899821,LastTimestamp:2025-05-13 07:16:11.057191574 +0000 UTC m=+1.390899821,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-1a4ba3031a.novalocal,}" May 13 07:16:11.119138 kubelet[1700]: E0513 07:16:11.119114 1700 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.235:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-1a4ba3031a.novalocal?timeout=10s\": dial tcp 172.24.4.235:6443: connect: connection refused" interval="200ms" May 13 07:16:11.070000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 07:16:11.124327 kubelet[1700]: W0513 07:16:11.124274 1700 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.235:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.124596 kubelet[1700]: E0513 07:16:11.124583 1700 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.235:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.125284 kubelet[1700]: I0513 07:16:11.125269 1700 factory.go:221] Registration of the systemd container factory successfully May 13 07:16:11.125417 kubelet[1700]: I0513 07:16:11.125400 1700 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 07:16:11.127289 kernel: audit: type=1401 audit(1747120571.070:381): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 07:16:11.070000 audit[1700]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006d5fe0 a1=c000c36528 a2=c000c2aa20 a3=25 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.127731 kubelet[1700]: I0513 07:16:11.127717 1700 factory.go:221] Registration of the containerd container factory successfully May 13 07:16:11.134284 kernel: audit: type=1300 audit(1747120571.070:381): arch=c000003e syscall=188 success=no exit=-22 a0=c0006d5fe0 a1=c000c36528 a2=c000c2aa20 a3=25 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 07:16:11.074000 audit[1710]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.144221 kernel: audit: type=1327 audit(1747120571.070:381): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 07:16:11.144284 kernel: audit: type=1325 audit(1747120571.074:382): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.144938 kubelet[1700]: E0513 07:16:11.144699 1700 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 07:16:11.074000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebeeeedf0 a2=0 a3=7ffebeeeeddc items=0 ppid=1700 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 07:16:11.074000 audit[1711]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.074000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc53b8b20 a2=0 a3=7ffcc53b8b0c items=0 ppid=1700 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 07:16:11.080000 audit[1713]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.080000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff8b6a22a0 a2=0 a3=7fff8b6a228c items=0 ppid=1700 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 07:16:11.082000 audit[1715]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.082000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcd0b80060 a2=0 a3=7ffcd0b8004c items=0 ppid=1700 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.156257 kernel: audit: type=1300 audit(1747120571.074:382): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebeeeedf0 a2=0 a3=7ffebeeeeddc items=0 ppid=1700 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 07:16:11.157000 audit[1723]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.157000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcd108afc0 a2=0 a3=7ffcd108afac items=0 ppid=1700 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 07:16:11.158420 kubelet[1700]: I0513 07:16:11.158383 1700 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 07:16:11.159405 kubelet[1700]: I0513 07:16:11.159384 1700 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 07:16:11.159461 kubelet[1700]: I0513 07:16:11.159408 1700 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 07:16:11.159461 kubelet[1700]: I0513 07:16:11.159430 1700 kubelet.go:2337] "Starting kubelet main sync loop" May 13 07:16:11.159524 kubelet[1700]: E0513 07:16:11.159463 1700 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 07:16:11.158000 audit[1724]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:11.158000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe05aea10 a2=0 a3=7fffe05ae9fc items=0 ppid=1700 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 07:16:11.160090 kubelet[1700]: W0513 07:16:11.160068 1700 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.235:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.160433 kubelet[1700]: E0513 07:16:11.160423 1700 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.235:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.160000 audit[1726]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:11.160000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb7adfbb0 a2=0 a3=7fffb7adfb9c items=0 ppid=1700 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 07:16:11.161000 audit[1725]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.161000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5dabe170 a2=0 a3=7ffc5dabe15c items=0 ppid=1700 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 07:16:11.162000 audit[1728]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:11.162000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe7243a790 a2=0 a3=7ffe7243a77c items=0 ppid=1700 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 07:16:11.163000 audit[1730]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:11.163000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe20a291d0 a2=0 a3=7ffe20a291bc items=0 ppid=1700 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 07:16:11.163000 audit[1729]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.163000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceda74940 a2=0 a3=7ffceda7492c items=0 ppid=1700 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 07:16:11.164000 audit[1731]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:11.164000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff55e88d60 a2=0 a3=7fff55e88d4c items=0 ppid=1700 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 07:16:11.169542 kubelet[1700]: I0513 07:16:11.169518 1700 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 07:16:11.169610 kubelet[1700]: I0513 07:16:11.169558 1700 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 07:16:11.169610 kubelet[1700]: I0513 07:16:11.169576 1700 state_mem.go:36] "Initialized new in-memory state store" May 13 07:16:11.174367 kubelet[1700]: I0513 07:16:11.174343 1700 policy_none.go:49] "None policy: Start" May 13 07:16:11.174798 kubelet[1700]: I0513 07:16:11.174780 1700 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 07:16:11.174847 kubelet[1700]: I0513 07:16:11.174819 1700 state_mem.go:35] "Initializing new in-memory state store" May 13 07:16:11.181051 kubelet[1700]: I0513 07:16:11.181012 1700 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.181606 kubelet[1700]: E0513 07:16:11.181456 1700 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.235:6443/api/v1/nodes\": dial tcp 172.24.4.235:6443: connect: connection refused" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.184034 systemd[1]: Created slice kubepods.slice. May 13 07:16:11.188923 systemd[1]: Created slice kubepods-burstable.slice. May 13 07:16:11.191733 systemd[1]: Created slice kubepods-besteffort.slice. May 13 07:16:11.197932 kubelet[1700]: I0513 07:16:11.197901 1700 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 07:16:11.197000 audit[1700]: AVC avc: denied { mac_admin } for pid=1700 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:11.197000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 07:16:11.197000 audit[1700]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d72600 a1=c000e86480 a2=c000d725d0 a3=25 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:11.197000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 07:16:11.198158 kubelet[1700]: I0513 07:16:11.197979 1700 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 07:16:11.198158 kubelet[1700]: I0513 07:16:11.198074 1700 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 07:16:11.198214 kubelet[1700]: I0513 07:16:11.198158 1700 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 07:16:11.199742 kubelet[1700]: E0513 07:16:11.199723 1700 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-n-1a4ba3031a.novalocal\" not found" May 13 07:16:11.267595 kubelet[1700]: I0513 07:16:11.260229 1700 topology_manager.go:215] "Topology Admit Handler" podUID="035101918d6152080a342ac4a4cb0c01" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.267595 kubelet[1700]: I0513 07:16:11.264354 1700 topology_manager.go:215] "Topology Admit Handler" podUID="d022b8d004c6e6a5f59029cadf0a062a" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.272832 kubelet[1700]: I0513 07:16:11.272443 1700 topology_manager.go:215] "Topology Admit Handler" podUID="298d8f3644e9af740b3a7c35e737ca7c" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.289846 systemd[1]: Created slice kubepods-burstable-podd022b8d004c6e6a5f59029cadf0a062a.slice. May 13 07:16:11.301540 systemd[1]: Created slice kubepods-burstable-pod035101918d6152080a342ac4a4cb0c01.slice. May 13 07:16:11.316541 systemd[1]: Created slice kubepods-burstable-pod298d8f3644e9af740b3a7c35e737ca7c.slice. May 13 07:16:11.321069 kubelet[1700]: E0513 07:16:11.320844 1700 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.235:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-1a4ba3031a.novalocal?timeout=10s\": dial tcp 172.24.4.235:6443: connect: connection refused" interval="400ms" May 13 07:16:11.385408 kubelet[1700]: I0513 07:16:11.385365 1700 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386128 kubelet[1700]: E0513 07:16:11.386071 1700 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.235:6443/api/v1/nodes\": dial tcp 172.24.4.235:6443: connect: connection refused" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386302 kubelet[1700]: I0513 07:16:11.386166 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386302 kubelet[1700]: I0513 07:16:11.386240 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386475 kubelet[1700]: I0513 07:16:11.386330 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/298d8f3644e9af740b3a7c35e737ca7c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"298d8f3644e9af740b3a7c35e737ca7c\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386475 kubelet[1700]: I0513 07:16:11.386378 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/035101918d6152080a342ac4a4cb0c01-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"035101918d6152080a342ac4a4cb0c01\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386475 kubelet[1700]: I0513 07:16:11.386423 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386475 kubelet[1700]: I0513 07:16:11.386467 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386735 kubelet[1700]: I0513 07:16:11.386509 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386735 kubelet[1700]: I0513 07:16:11.386551 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/035101918d6152080a342ac4a4cb0c01-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"035101918d6152080a342ac4a4cb0c01\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.386735 kubelet[1700]: I0513 07:16:11.386594 1700 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/035101918d6152080a342ac4a4cb0c01-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"035101918d6152080a342ac4a4cb0c01\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.600888 env[1159]: time="2025-05-13T07:16:11.600677725Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal,Uid:d022b8d004c6e6a5f59029cadf0a062a,Namespace:kube-system,Attempt:0,}" May 13 07:16:11.613797 env[1159]: time="2025-05-13T07:16:11.612958512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal,Uid:035101918d6152080a342ac4a4cb0c01,Namespace:kube-system,Attempt:0,}" May 13 07:16:11.623865 env[1159]: time="2025-05-13T07:16:11.623732901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal,Uid:298d8f3644e9af740b3a7c35e737ca7c,Namespace:kube-system,Attempt:0,}" May 13 07:16:11.722622 kubelet[1700]: E0513 07:16:11.722541 1700 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.235:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-1a4ba3031a.novalocal?timeout=10s\": dial tcp 172.24.4.235:6443: connect: connection refused" interval="800ms" May 13 07:16:11.790208 kubelet[1700]: I0513 07:16:11.790148 1700 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.790766 kubelet[1700]: E0513 07:16:11.790701 1700 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.235:6443/api/v1/nodes\": dial tcp 172.24.4.235:6443: connect: connection refused" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:11.989938 kubelet[1700]: W0513 07:16:11.989810 1700 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.235:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:11.989938 kubelet[1700]: E0513 07:16:11.989890 1700 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.235:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:12.017065 kubelet[1700]: W0513 07:16:12.016948 1700 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.235:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:12.017065 kubelet[1700]: E0513 07:16:12.017019 1700 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.235:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:12.188968 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3211251794.mount: Deactivated successfully. May 13 07:16:12.203454 env[1159]: time="2025-05-13T07:16:12.203386648Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.209501 env[1159]: time="2025-05-13T07:16:12.209420348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.211575 env[1159]: time="2025-05-13T07:16:12.211438786Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.215230 env[1159]: time="2025-05-13T07:16:12.215150521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.218807 env[1159]: time="2025-05-13T07:16:12.218737033Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.222632 env[1159]: time="2025-05-13T07:16:12.222535892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.224486 env[1159]: time="2025-05-13T07:16:12.224425988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.232360 env[1159]: time="2025-05-13T07:16:12.232296646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.240399 env[1159]: time="2025-05-13T07:16:12.240167244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.244152 env[1159]: time="2025-05-13T07:16:12.244085306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.246500 env[1159]: time="2025-05-13T07:16:12.246415437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.263923 kubelet[1700]: W0513 07:16:12.263806 1700 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.235:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:12.264544 kubelet[1700]: E0513 07:16:12.263935 1700 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.235:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:12.270062 env[1159]: time="2025-05-13T07:16:12.269960896Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:12.295931 env[1159]: time="2025-05-13T07:16:12.295814937Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:16:12.296355 env[1159]: time="2025-05-13T07:16:12.295865871Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:16:12.296355 env[1159]: time="2025-05-13T07:16:12.295921566Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:16:12.296841 env[1159]: time="2025-05-13T07:16:12.296725531Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2967f8ec8146109c535556039b1b30a3e9a9deb17bf9c1a95d89f284379ca82c pid=1739 runtime=io.containerd.runc.v2 May 13 07:16:12.315742 env[1159]: time="2025-05-13T07:16:12.315336367Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:16:12.315742 env[1159]: time="2025-05-13T07:16:12.315393293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:16:12.315742 env[1159]: time="2025-05-13T07:16:12.315409624Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:16:12.316679 env[1159]: time="2025-05-13T07:16:12.316229958Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c64157a4719f65e5a25333058f5abb29b7e3cf0716f43e86c98afd71091ca53d pid=1759 runtime=io.containerd.runc.v2 May 13 07:16:12.335735 systemd[1]: Started cri-containerd-2967f8ec8146109c535556039b1b30a3e9a9deb17bf9c1a95d89f284379ca82c.scope. May 13 07:16:12.343597 env[1159]: time="2025-05-13T07:16:12.343523002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:16:12.343597 env[1159]: time="2025-05-13T07:16:12.343569860Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:16:12.344712 env[1159]: time="2025-05-13T07:16:12.343583595Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:16:12.346147 systemd[1]: Started cri-containerd-c64157a4719f65e5a25333058f5abb29b7e3cf0716f43e86c98afd71091ca53d.scope. May 13 07:16:12.349888 env[1159]: time="2025-05-13T07:16:12.348837927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad60eca1dbda18d7271041e98dc69f009f879c838a3674ee869665b5cbf9304a pid=1788 runtime=io.containerd.runc.v2 May 13 07:16:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.364000 audit: BPF prog-id=58 op=LOAD May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343135376134373139663635653561323533333330353866356162 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343135376134373139663635653561323533333330353866356162 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit: BPF prog-id=59 op=LOAD May 13 07:16:12.365000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292520 items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343135376134373139663635653561323533333330353866356162 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit: BPF prog-id=60 op=LOAD May 13 07:16:12.365000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000292568 items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343135376134373139663635653561323533333330353866356162 May 13 07:16:12.365000 audit: BPF prog-id=60 op=UNLOAD May 13 07:16:12.365000 audit: BPF prog-id=59 op=UNLOAD May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.365000 audit: BPF prog-id=61 op=LOAD May 13 07:16:12.365000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000292978 items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343135376134373139663635653561323533333330353866356162 May 13 07:16:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.371000 audit: BPF prog-id=62 op=LOAD May 13 07:16:12.373000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.373000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1739 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239363766386563383134363130396335333535353630333962316233 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=1739 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239363766386563383134363130396335333535353630333962316233 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.374000 audit: BPF prog-id=63 op=LOAD May 13 07:16:12.374000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000299500 items=0 ppid=1739 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239363766386563383134363130396335333535353630333962316233 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.377000 audit: BPF prog-id=64 op=LOAD May 13 07:16:12.377000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000299548 items=0 ppid=1739 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239363766386563383134363130396335333535353630333962316233 May 13 07:16:12.378000 audit: BPF prog-id=64 op=UNLOAD May 13 07:16:12.378000 audit: BPF prog-id=63 op=UNLOAD May 13 07:16:12.379000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.379000 audit: BPF prog-id=65 op=LOAD May 13 07:16:12.379000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000299958 items=0 ppid=1739 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239363766386563383134363130396335333535353630333962316233 May 13 07:16:12.398545 systemd[1]: Started cri-containerd-ad60eca1dbda18d7271041e98dc69f009f879c838a3674ee869665b5cbf9304a.scope. May 13 07:16:12.420176 env[1159]: time="2025-05-13T07:16:12.420126659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal,Uid:035101918d6152080a342ac4a4cb0c01,Namespace:kube-system,Attempt:0,} returns sandbox id \"2967f8ec8146109c535556039b1b30a3e9a9deb17bf9c1a95d89f284379ca82c\"" May 13 07:16:12.427599 env[1159]: time="2025-05-13T07:16:12.427548737Z" level=info msg="CreateContainer within sandbox \"2967f8ec8146109c535556039b1b30a3e9a9deb17bf9c1a95d89f284379ca82c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 07:16:12.435716 env[1159]: time="2025-05-13T07:16:12.435644627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal,Uid:d022b8d004c6e6a5f59029cadf0a062a,Namespace:kube-system,Attempt:0,} returns sandbox id \"c64157a4719f65e5a25333058f5abb29b7e3cf0716f43e86c98afd71091ca53d\"" May 13 07:16:12.439217 env[1159]: time="2025-05-13T07:16:12.439183649Z" level=info msg="CreateContainer within sandbox \"c64157a4719f65e5a25333058f5abb29b7e3cf0716f43e86c98afd71091ca53d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 07:16:12.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.445000 audit: BPF prog-id=66 op=LOAD May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363065636131646264613138643732373130343165393864633639 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363065636131646264613138643732373130343165393864633639 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit: BPF prog-id=67 op=LOAD May 13 07:16:12.446000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002dbde0 items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363065636131646264613138643732373130343165393864633639 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit: BPF prog-id=68 op=LOAD May 13 07:16:12.446000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002dbe28 items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363065636131646264613138643732373130343165393864633639 May 13 07:16:12.446000 audit: BPF prog-id=68 op=UNLOAD May 13 07:16:12.446000 audit: BPF prog-id=67 op=UNLOAD May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.446000 audit: BPF prog-id=69 op=LOAD May 13 07:16:12.446000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003da238 items=0 ppid=1788 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363065636131646264613138643732373130343165393864633639 May 13 07:16:12.464499 env[1159]: time="2025-05-13T07:16:12.464448286Z" level=info msg="CreateContainer within sandbox \"2967f8ec8146109c535556039b1b30a3e9a9deb17bf9c1a95d89f284379ca82c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"17980e1a7f7b94689838c970109a99cccd536f6a7446c2577c0f3053d9e083cd\"" May 13 07:16:12.465363 env[1159]: time="2025-05-13T07:16:12.465336719Z" level=info msg="StartContainer for \"17980e1a7f7b94689838c970109a99cccd536f6a7446c2577c0f3053d9e083cd\"" May 13 07:16:12.484333 env[1159]: time="2025-05-13T07:16:12.483369914Z" level=info msg="CreateContainer within sandbox \"c64157a4719f65e5a25333058f5abb29b7e3cf0716f43e86c98afd71091ca53d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1df78e39454cc1edf956185d573a856cc1749f3b7f54862e5fafe4ebe9bd580f\"" May 13 07:16:12.490028 env[1159]: time="2025-05-13T07:16:12.488340495Z" level=info msg="StartContainer for \"1df78e39454cc1edf956185d573a856cc1749f3b7f54862e5fafe4ebe9bd580f\"" May 13 07:16:12.488973 systemd[1]: Started cri-containerd-17980e1a7f7b94689838c970109a99cccd536f6a7446c2577c0f3053d9e083cd.scope. May 13 07:16:12.513179 env[1159]: time="2025-05-13T07:16:12.513072727Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal,Uid:298d8f3644e9af740b3a7c35e737ca7c,Namespace:kube-system,Attempt:0,} returns sandbox id \"ad60eca1dbda18d7271041e98dc69f009f879c838a3674ee869665b5cbf9304a\"" May 13 07:16:12.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.517000 audit: BPF prog-id=70 op=LOAD May 13 07:16:12.518000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.518000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1739 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393830653161376637623934363839383338633937303130396139 May 13 07:16:12.518000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.518000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1739 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393830653161376637623934363839383338633937303130396139 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit: BPF prog-id=71 op=LOAD May 13 07:16:12.519000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00029f1d0 items=0 ppid=1739 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393830653161376637623934363839383338633937303130396139 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.519000 audit: BPF prog-id=72 op=LOAD May 13 07:16:12.519000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00029f218 items=0 ppid=1739 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393830653161376637623934363839383338633937303130396139 May 13 07:16:12.520000 audit: BPF prog-id=72 op=UNLOAD May 13 07:16:12.520000 audit: BPF prog-id=71 op=UNLOAD May 13 07:16:12.520000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.520000 audit: BPF prog-id=73 op=LOAD May 13 07:16:12.520000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00029f628 items=0 ppid=1739 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137393830653161376637623934363839383338633937303130396139 May 13 07:16:12.523111 kubelet[1700]: E0513 07:16:12.523067 1700 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.235:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-1a4ba3031a.novalocal?timeout=10s\": dial tcp 172.24.4.235:6443: connect: connection refused" interval="1.6s" May 13 07:16:12.528863 env[1159]: time="2025-05-13T07:16:12.528811217Z" level=info msg="CreateContainer within sandbox \"ad60eca1dbda18d7271041e98dc69f009f879c838a3674ee869665b5cbf9304a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 07:16:12.538464 systemd[1]: Started cri-containerd-1df78e39454cc1edf956185d573a856cc1749f3b7f54862e5fafe4ebe9bd580f.scope. May 13 07:16:12.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.557000 audit: BPF prog-id=74 op=LOAD May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1759 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663738653339343534636331656466393536313835643537336138 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1759 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663738653339343534636331656466393536313835643537336138 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit: BPF prog-id=75 op=LOAD May 13 07:16:12.558000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000393060 items=0 ppid=1759 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663738653339343534636331656466393536313835643537336138 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.558000 audit: BPF prog-id=76 op=LOAD May 13 07:16:12.558000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003930a8 items=0 ppid=1759 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663738653339343534636331656466393536313835643537336138 May 13 07:16:12.558000 audit: BPF prog-id=76 op=UNLOAD May 13 07:16:12.558000 audit: BPF prog-id=75 op=UNLOAD May 13 07:16:12.559000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.559000 audit: BPF prog-id=77 op=LOAD May 13 07:16:12.559000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003934b8 items=0 ppid=1759 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164663738653339343534636331656466393536313835643537336138 May 13 07:16:12.574292 kubelet[1700]: W0513 07:16:12.569565 1700 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.235:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-1a4ba3031a.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:12.574292 kubelet[1700]: E0513 07:16:12.569631 1700 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.235:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-1a4ba3031a.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.235:6443: connect: connection refused May 13 07:16:12.575293 env[1159]: time="2025-05-13T07:16:12.575259425Z" level=info msg="CreateContainer within sandbox \"ad60eca1dbda18d7271041e98dc69f009f879c838a3674ee869665b5cbf9304a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6799717f4845925283854fb4f1ceceb5f772e8e7b5243a62da4616dd2e4b7075\"" May 13 07:16:12.576587 env[1159]: time="2025-05-13T07:16:12.576535663Z" level=info msg="StartContainer for \"6799717f4845925283854fb4f1ceceb5f772e8e7b5243a62da4616dd2e4b7075\"" May 13 07:16:12.584913 env[1159]: time="2025-05-13T07:16:12.584867103Z" level=info msg="StartContainer for \"17980e1a7f7b94689838c970109a99cccd536f6a7446c2577c0f3053d9e083cd\" returns successfully" May 13 07:16:12.593549 kubelet[1700]: I0513 07:16:12.593214 1700 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:12.593549 kubelet[1700]: E0513 07:16:12.593512 1700 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.235:6443/api/v1/nodes\": dial tcp 172.24.4.235:6443: connect: connection refused" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:12.603804 systemd[1]: Started cri-containerd-6799717f4845925283854fb4f1ceceb5f772e8e7b5243a62da4616dd2e4b7075.scope. May 13 07:16:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.621000 audit: BPF prog-id=78 op=LOAD May 13 07:16:12.622000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1788 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393937313766343834353932353238333835346662346631636563 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1788 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393937313766343834353932353238333835346662346631636563 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.622000 audit: BPF prog-id=79 op=LOAD May 13 07:16:12.622000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025780 items=0 ppid=1788 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393937313766343834353932353238333835346662346631636563 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit: BPF prog-id=80 op=LOAD May 13 07:16:12.623000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000257c8 items=0 ppid=1788 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393937313766343834353932353238333835346662346631636563 May 13 07:16:12.623000 audit: BPF prog-id=80 op=UNLOAD May 13 07:16:12.623000 audit: BPF prog-id=79 op=UNLOAD May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:12.623000 audit: BPF prog-id=81 op=LOAD May 13 07:16:12.623000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025bd8 items=0 ppid=1788 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:12.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393937313766343834353932353238333835346662346631636563 May 13 07:16:12.639510 env[1159]: time="2025-05-13T07:16:12.639446617Z" level=info msg="StartContainer for \"1df78e39454cc1edf956185d573a856cc1749f3b7f54862e5fafe4ebe9bd580f\" returns successfully" May 13 07:16:12.661984 env[1159]: time="2025-05-13T07:16:12.661926323Z" level=info msg="StartContainer for \"6799717f4845925283854fb4f1ceceb5f772e8e7b5243a62da4616dd2e4b7075\" returns successfully" May 13 07:16:14.196028 kubelet[1700]: I0513 07:16:14.196000 1700 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:14.796000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:14.796000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0078e6b10 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:16:14.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:16:14.797000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:14.797000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0078e6b70 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:16:14.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:16:14.810000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:14.810000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0078e7620 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:16:14.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:16:14.810000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:14.810000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0090ef520 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:16:14.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:16:14.873000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:14.873000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004da8320 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:16:14.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:16:14.873000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:14.873000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007456ea0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:16:14.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:16:14.914612 kubelet[1700]: E0513 07:16:14.914583 1700 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-n-1a4ba3031a.novalocal\" not found" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:14.935379 kubelet[1700]: E0513 07:16:14.935276 1700 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-7-n-1a4ba3031a.novalocal.183f04e719a43a96 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-1a4ba3031a.novalocal,UID:ci-3510-3-7-n-1a4ba3031a.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-1a4ba3031a.novalocal,},FirstTimestamp:2025-05-13 07:16:11.057191574 +0000 UTC m=+1.390899821,LastTimestamp:2025-05-13 07:16:11.057191574 +0000 UTC m=+1.390899821,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-1a4ba3031a.novalocal,}" May 13 07:16:14.987000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:14.987000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000656120 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:14.987000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:16:14.988000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:14.988000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00087f6c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:14.988000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:16:14.996636 kubelet[1700]: E0513 07:16:14.996546 1700 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-7-n-1a4ba3031a.novalocal.183f04e71edb38d8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-1a4ba3031a.novalocal,UID:ci-3510-3-7-n-1a4ba3031a.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-1a4ba3031a.novalocal,},FirstTimestamp:2025-05-13 07:16:11.144681688 +0000 UTC m=+1.478389855,LastTimestamp:2025-05-13 07:16:11.144681688 +0000 UTC m=+1.478389855,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-1a4ba3031a.novalocal,}" May 13 07:16:15.094763 kubelet[1700]: I0513 07:16:15.094671 1700 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:15.129087 kubelet[1700]: E0513 07:16:15.129062 1700 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-1a4ba3031a.novalocal\" not found" May 13 07:16:15.229919 kubelet[1700]: E0513 07:16:15.229880 1700 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-1a4ba3031a.novalocal\" not found" May 13 07:16:15.331261 kubelet[1700]: E0513 07:16:15.331184 1700 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-1a4ba3031a.novalocal\" not found" May 13 07:16:15.431712 kubelet[1700]: E0513 07:16:15.431680 1700 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-1a4ba3031a.novalocal\" not found" May 13 07:16:15.533348 kubelet[1700]: E0513 07:16:15.533238 1700 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-1a4ba3031a.novalocal\" not found" May 13 07:16:15.969089 kubelet[1700]: W0513 07:16:15.969039 1700 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 07:16:16.046262 kubelet[1700]: I0513 07:16:16.046172 1700 apiserver.go:52] "Watching apiserver" May 13 07:16:16.082946 kubelet[1700]: I0513 07:16:16.082848 1700 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 07:16:17.698589 kubelet[1700]: W0513 07:16:17.698521 1700 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 07:16:18.087339 systemd[1]: Reloading. May 13 07:16:18.245421 /usr/lib/systemd/system-generators/torcx-generator[1988]: time="2025-05-13T07:16:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 07:16:18.245455 /usr/lib/systemd/system-generators/torcx-generator[1988]: time="2025-05-13T07:16:18Z" level=info msg="torcx already run" May 13 07:16:18.325676 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 07:16:18.325833 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 07:16:18.348554 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 07:16:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.436947 kernel: kauditd_printk_skb: 404 callbacks suppressed May 13 07:16:18.437007 kernel: audit: type=1400 audit(1747120578.434:511): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.451568 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 07:16:18.451622 kernel: audit: type=1400 audit(1747120578.434:512): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.451653 kernel: audit: audit_lost=61 audit_rate_limit=0 audit_backlog_limit=64 May 13 07:16:18.451677 kernel: audit: backlog limit exceeded May 13 07:16:18.451698 kernel: audit: type=1400 audit(1747120578.434:513): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.461220 kernel: audit: type=1400 audit(1747120578.434:514): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.461308 kernel: audit: type=1400 audit(1747120578.434:515): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.467611 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 07:16:18.467662 kernel: audit: type=1400 audit(1747120578.434:516): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit: BPF prog-id=82 op=LOAD May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit: BPF prog-id=83 op=LOAD May 13 07:16:18.440000 audit: BPF prog-id=43 op=UNLOAD May 13 07:16:18.440000 audit: BPF prog-id=44 op=UNLOAD May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.440000 audit: BPF prog-id=84 op=LOAD May 13 07:16:18.440000 audit: BPF prog-id=45 op=UNLOAD May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit: BPF prog-id=85 op=LOAD May 13 07:16:18.441000 audit: BPF prog-id=46 op=UNLOAD May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit: BPF prog-id=86 op=LOAD May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.441000 audit: BPF prog-id=87 op=LOAD May 13 07:16:18.455000 audit: BPF prog-id=48 op=UNLOAD May 13 07:16:18.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit: BPF prog-id=89 op=LOAD May 13 07:16:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.473000 audit: BPF prog-id=90 op=LOAD May 13 07:16:18.473000 audit: BPF prog-id=50 op=UNLOAD May 13 07:16:18.473000 audit: BPF prog-id=51 op=UNLOAD May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit: BPF prog-id=91 op=LOAD May 13 07:16:18.475000 audit: BPF prog-id=52 op=UNLOAD May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.475000 audit: BPF prog-id=92 op=LOAD May 13 07:16:18.475000 audit: BPF prog-id=74 op=UNLOAD May 13 07:16:18.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.477000 audit: BPF prog-id=93 op=LOAD May 13 07:16:18.477000 audit: BPF prog-id=53 op=UNLOAD May 13 07:16:18.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.479000 audit: BPF prog-id=94 op=LOAD May 13 07:16:18.479000 audit: BPF prog-id=58 op=UNLOAD May 13 07:16:18.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit: BPF prog-id=95 op=LOAD May 13 07:16:18.482000 audit: BPF prog-id=66 op=UNLOAD May 13 07:16:18.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.482000 audit: BPF prog-id=96 op=LOAD May 13 07:16:18.482000 audit: BPF prog-id=62 op=UNLOAD May 13 07:16:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.483000 audit: BPF prog-id=97 op=LOAD May 13 07:16:18.483000 audit: BPF prog-id=54 op=UNLOAD May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit: BPF prog-id=98 op=LOAD May 13 07:16:18.484000 audit: BPF prog-id=55 op=UNLOAD May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit: BPF prog-id=99 op=LOAD May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit: BPF prog-id=100 op=LOAD May 13 07:16:18.484000 audit: BPF prog-id=56 op=UNLOAD May 13 07:16:18.484000 audit: BPF prog-id=57 op=UNLOAD May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit: BPF prog-id=101 op=LOAD May 13 07:16:18.485000 audit: BPF prog-id=78 op=UNLOAD May 13 07:16:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.485000 audit: BPF prog-id=102 op=LOAD May 13 07:16:18.485000 audit: BPF prog-id=70 op=UNLOAD May 13 07:16:18.506573 systemd[1]: Stopping kubelet.service... May 13 07:16:18.528882 systemd[1]: kubelet.service: Deactivated successfully. May 13 07:16:18.529070 systemd[1]: Stopped kubelet.service. May 13 07:16:18.529133 systemd[1]: kubelet.service: Consumed 1.518s CPU time. May 13 07:16:18.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:18.530766 systemd[1]: Starting kubelet.service... May 13 07:16:18.626215 systemd[1]: Started kubelet.service. May 13 07:16:18.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:18.770388 kubelet[2039]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 07:16:18.771327 kubelet[2039]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 07:16:18.771544 kubelet[2039]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 07:16:18.771944 kubelet[2039]: I0513 07:16:18.771868 2039 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 07:16:18.783401 kubelet[2039]: I0513 07:16:18.783354 2039 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 13 07:16:18.783629 kubelet[2039]: I0513 07:16:18.783604 2039 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 07:16:18.784356 kubelet[2039]: I0513 07:16:18.784316 2039 server.go:927] "Client rotation is on, will bootstrap in background" May 13 07:16:18.788864 kubelet[2039]: I0513 07:16:18.788823 2039 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 07:16:18.792159 kubelet[2039]: I0513 07:16:18.792100 2039 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 07:16:18.817050 kubelet[2039]: I0513 07:16:18.817023 2039 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 07:16:18.817648 kubelet[2039]: I0513 07:16:18.817594 2039 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 07:16:18.818046 kubelet[2039]: I0513 07:16:18.817751 2039 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-1a4ba3031a.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 13 07:16:18.818336 kubelet[2039]: I0513 07:16:18.818321 2039 topology_manager.go:138] "Creating topology manager with none policy" May 13 07:16:18.818449 kubelet[2039]: I0513 07:16:18.818421 2039 container_manager_linux.go:301] "Creating device plugin manager" May 13 07:16:18.818622 kubelet[2039]: I0513 07:16:18.818611 2039 state_mem.go:36] "Initialized new in-memory state store" May 13 07:16:18.818856 kubelet[2039]: I0513 07:16:18.818847 2039 kubelet.go:400] "Attempting to sync node with API server" May 13 07:16:18.819300 kubelet[2039]: I0513 07:16:18.819233 2039 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 07:16:18.819359 kubelet[2039]: I0513 07:16:18.819336 2039 kubelet.go:312] "Adding apiserver pod source" May 13 07:16:18.819397 kubelet[2039]: I0513 07:16:18.819368 2039 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 07:16:18.830030 kubelet[2039]: I0513 07:16:18.830011 2039 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 07:16:18.830390 kubelet[2039]: I0513 07:16:18.830377 2039 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 07:16:18.835996 kubelet[2039]: I0513 07:16:18.830938 2039 server.go:1264] "Started kubelet" May 13 07:16:18.838000 audit[2039]: AVC avc: denied { mac_admin } for pid=2039 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.838000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 07:16:18.838000 audit[2039]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c25a40 a1=c000c58eb8 a2=c000c25a10 a3=25 items=0 ppid=1 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:18.838000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 07:16:18.840016 kubelet[2039]: I0513 07:16:18.839987 2039 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 07:16:18.838000 audit[2039]: AVC avc: denied { mac_admin } for pid=2039 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.838000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 07:16:18.838000 audit[2039]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c568c0 a1=c000c58ed0 a2=c000c25ad0 a3=25 items=0 ppid=1 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:18.838000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 07:16:18.840414 kubelet[2039]: I0513 07:16:18.840394 2039 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 07:16:18.840505 kubelet[2039]: I0513 07:16:18.840495 2039 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 07:16:18.853012 kubelet[2039]: I0513 07:16:18.831732 2039 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 07:16:18.853507 kubelet[2039]: I0513 07:16:18.853470 2039 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 07:16:18.855139 kubelet[2039]: I0513 07:16:18.855123 2039 volume_manager.go:291] "Starting Kubelet Volume Manager" May 13 07:16:18.855775 kubelet[2039]: I0513 07:16:18.855761 2039 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 07:16:18.856009 kubelet[2039]: I0513 07:16:18.855998 2039 reconciler.go:26] "Reconciler: start to sync state" May 13 07:16:18.857438 kubelet[2039]: I0513 07:16:18.857410 2039 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 07:16:18.859980 kubelet[2039]: I0513 07:16:18.859960 2039 server.go:455] "Adding debug handlers to kubelet server" May 13 07:16:18.870675 kubelet[2039]: I0513 07:16:18.870644 2039 factory.go:221] Registration of the systemd container factory successfully May 13 07:16:18.871050 kubelet[2039]: I0513 07:16:18.871030 2039 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 07:16:18.890167 kubelet[2039]: E0513 07:16:18.888353 2039 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 07:16:18.898003 kubelet[2039]: I0513 07:16:18.897970 2039 factory.go:221] Registration of the containerd container factory successfully May 13 07:16:18.899561 kubelet[2039]: I0513 07:16:18.899145 2039 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 07:16:18.904109 kubelet[2039]: I0513 07:16:18.902755 2039 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 07:16:18.904109 kubelet[2039]: I0513 07:16:18.902796 2039 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 07:16:18.904109 kubelet[2039]: I0513 07:16:18.902815 2039 kubelet.go:2337] "Starting kubelet main sync loop" May 13 07:16:18.904109 kubelet[2039]: E0513 07:16:18.902860 2039 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 07:16:18.963350 kubelet[2039]: I0513 07:16:18.963310 2039 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:18.975516 kubelet[2039]: I0513 07:16:18.975480 2039 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:18.975679 kubelet[2039]: I0513 07:16:18.975634 2039 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:18.985802 kubelet[2039]: I0513 07:16:18.985684 2039 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 07:16:18.986071 kubelet[2039]: I0513 07:16:18.986059 2039 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 07:16:18.986167 kubelet[2039]: I0513 07:16:18.986157 2039 state_mem.go:36] "Initialized new in-memory state store" May 13 07:16:18.986470 kubelet[2039]: I0513 07:16:18.986455 2039 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 07:16:18.986624 kubelet[2039]: I0513 07:16:18.986595 2039 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 07:16:18.986690 kubelet[2039]: I0513 07:16:18.986681 2039 policy_none.go:49] "None policy: Start" May 13 07:16:18.987593 kubelet[2039]: I0513 07:16:18.987580 2039 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 07:16:18.987667 kubelet[2039]: I0513 07:16:18.987659 2039 state_mem.go:35] "Initializing new in-memory state store" May 13 07:16:18.987944 kubelet[2039]: I0513 07:16:18.987931 2039 state_mem.go:75] "Updated machine memory state" May 13 07:16:18.995737 kubelet[2039]: I0513 07:16:18.994398 2039 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 07:16:18.994000 audit[2039]: AVC avc: denied { mac_admin } for pid=2039 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:18.994000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 07:16:18.994000 audit[2039]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c25800 a1=c000a06168 a2=c000c257d0 a3=25 items=0 ppid=1 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:18.994000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 07:16:18.998384 kubelet[2039]: I0513 07:16:18.997299 2039 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 07:16:18.998384 kubelet[2039]: I0513 07:16:18.997602 2039 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 07:16:18.998384 kubelet[2039]: I0513 07:16:18.997842 2039 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 07:16:19.004426 kubelet[2039]: I0513 07:16:19.004367 2039 topology_manager.go:215] "Topology Admit Handler" podUID="035101918d6152080a342ac4a4cb0c01" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.004873 kubelet[2039]: I0513 07:16:19.004858 2039 topology_manager.go:215] "Topology Admit Handler" podUID="d022b8d004c6e6a5f59029cadf0a062a" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.005016 kubelet[2039]: I0513 07:16:19.005000 2039 topology_manager.go:215] "Topology Admit Handler" podUID="298d8f3644e9af740b3a7c35e737ca7c" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.016126 kubelet[2039]: W0513 07:16:19.016099 2039 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 07:16:19.016470 kubelet[2039]: E0513 07:16:19.016441 2039 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.020332 kubelet[2039]: W0513 07:16:19.020312 2039 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 07:16:19.020506 kubelet[2039]: E0513 07:16:19.020489 2039 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.020779 kubelet[2039]: W0513 07:16:19.020765 2039 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 07:16:19.063000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 07:16:19.063000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c3a1c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:19.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:16:19.157208 kubelet[2039]: I0513 07:16:19.157040 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.157473 kubelet[2039]: I0513 07:16:19.157455 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.157585 kubelet[2039]: I0513 07:16:19.157564 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.157707 kubelet[2039]: I0513 07:16:19.157679 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/298d8f3644e9af740b3a7c35e737ca7c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"298d8f3644e9af740b3a7c35e737ca7c\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.157829 kubelet[2039]: I0513 07:16:19.157814 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/035101918d6152080a342ac4a4cb0c01-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"035101918d6152080a342ac4a4cb0c01\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.157924 kubelet[2039]: I0513 07:16:19.157908 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.158022 kubelet[2039]: I0513 07:16:19.158007 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d022b8d004c6e6a5f59029cadf0a062a-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"d022b8d004c6e6a5f59029cadf0a062a\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.158208 kubelet[2039]: I0513 07:16:19.158189 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/035101918d6152080a342ac4a4cb0c01-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"035101918d6152080a342ac4a4cb0c01\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.158392 kubelet[2039]: I0513 07:16:19.158376 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/035101918d6152080a342ac4a4cb0c01-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal\" (UID: \"035101918d6152080a342ac4a4cb0c01\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.837615 kubelet[2039]: I0513 07:16:19.837440 2039 apiserver.go:52] "Watching apiserver" May 13 07:16:19.858369 kubelet[2039]: I0513 07:16:19.858086 2039 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 07:16:19.961302 kubelet[2039]: W0513 07:16:19.957732 2039 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 07:16:19.961302 kubelet[2039]: E0513 07:16:19.957886 2039 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:16:19.976338 kubelet[2039]: I0513 07:16:19.976178 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-n-1a4ba3031a.novalocal" podStartSLOduration=4.976074357 podStartE2EDuration="4.976074357s" podCreationTimestamp="2025-05-13 07:16:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 07:16:19.975203356 +0000 UTC m=+1.342438861" watchObservedRunningTime="2025-05-13 07:16:19.976074357 +0000 UTC m=+1.343309862" May 13 07:16:20.014448 kubelet[2039]: I0513 07:16:20.014302 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1a4ba3031a.novalocal" podStartSLOduration=1.014233093 podStartE2EDuration="1.014233093s" podCreationTimestamp="2025-05-13 07:16:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 07:16:20.013420231 +0000 UTC m=+1.380655736" watchObservedRunningTime="2025-05-13 07:16:20.014233093 +0000 UTC m=+1.381468598" May 13 07:16:20.014696 kubelet[2039]: I0513 07:16:20.014531 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-n-1a4ba3031a.novalocal" podStartSLOduration=3.014519068 podStartE2EDuration="3.014519068s" podCreationTimestamp="2025-05-13 07:16:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 07:16:20.00215405 +0000 UTC m=+1.369389555" watchObservedRunningTime="2025-05-13 07:16:20.014519068 +0000 UTC m=+1.381754634" May 13 07:16:25.205126 sudo[1334]: pam_unix(sudo:session): session closed for user root May 13 07:16:25.221726 kernel: kauditd_printk_skb: 267 callbacks suppressed May 13 07:16:25.221796 kernel: audit: type=1106 audit(1747120585.204:753): pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:16:25.204000 audit[1334]: USER_END pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:16:25.226958 kernel: audit: type=1104 audit(1747120585.208:754): pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:16:25.208000 audit[1334]: CRED_DISP pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 07:16:25.369528 sshd[1330]: pam_unix(sshd:session): session closed for user core May 13 07:16:25.373000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:16:25.373000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:16:25.385092 systemd[1]: sshd@8-172.24.4.235:22-172.24.4.1:50868.service: Deactivated successfully. May 13 07:16:25.386751 systemd[1]: session-9.scope: Deactivated successfully. May 13 07:16:25.387045 systemd[1]: session-9.scope: Consumed 6.976s CPU time. May 13 07:16:25.389446 kernel: audit: type=1106 audit(1747120585.373:755): pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:16:25.389574 kernel: audit: type=1104 audit(1747120585.373:756): pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:16:25.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.235:22-172.24.4.1:50868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:25.389705 systemd-logind[1146]: Session 9 logged out. Waiting for processes to exit. May 13 07:16:25.395304 kernel: audit: type=1131 audit(1747120585.383:757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.235:22-172.24.4.1:50868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:16:25.396076 systemd-logind[1146]: Removed session 9. May 13 07:16:29.991000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:29.991000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001294740 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:30.023823 kernel: audit: type=1400 audit(1747120589.991:758): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:30.023983 kernel: audit: type=1300 audit(1747120589.991:758): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001294740 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:29.991000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:16:30.031275 kernel: audit: type=1327 audit(1747120589.991:758): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:16:30.019000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:30.019000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012950e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:30.049226 kernel: audit: type=1400 audit(1747120590.019:759): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:30.049382 kernel: audit: type=1300 audit(1747120590.019:759): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012950e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:30.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:16:30.019000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:30.019000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001295120 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:30.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:16:30.019000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:16:30.019000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001295160 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:16:30.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:16:31.850735 kubelet[2039]: I0513 07:16:31.850667 2039 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 07:16:31.851605 env[1159]: time="2025-05-13T07:16:31.851141843Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 07:16:31.852362 kubelet[2039]: I0513 07:16:31.852317 2039 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 07:16:32.620026 kubelet[2039]: I0513 07:16:32.619917 2039 topology_manager.go:215] "Topology Admit Handler" podUID="cef265a4-3ee7-4389-b35b-1c1a5da49b2d" podNamespace="kube-system" podName="kube-proxy-jb5qh" May 13 07:16:32.633176 systemd[1]: Created slice kubepods-besteffort-podcef265a4_3ee7_4389_b35b_1c1a5da49b2d.slice. May 13 07:16:32.750641 kubelet[2039]: I0513 07:16:32.750604 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7zb6\" (UniqueName: \"kubernetes.io/projected/cef265a4-3ee7-4389-b35b-1c1a5da49b2d-kube-api-access-j7zb6\") pod \"kube-proxy-jb5qh\" (UID: \"cef265a4-3ee7-4389-b35b-1c1a5da49b2d\") " pod="kube-system/kube-proxy-jb5qh" May 13 07:16:32.750874 kubelet[2039]: I0513 07:16:32.750859 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cef265a4-3ee7-4389-b35b-1c1a5da49b2d-kube-proxy\") pod \"kube-proxy-jb5qh\" (UID: \"cef265a4-3ee7-4389-b35b-1c1a5da49b2d\") " pod="kube-system/kube-proxy-jb5qh" May 13 07:16:32.750985 kubelet[2039]: I0513 07:16:32.750968 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cef265a4-3ee7-4389-b35b-1c1a5da49b2d-xtables-lock\") pod \"kube-proxy-jb5qh\" (UID: \"cef265a4-3ee7-4389-b35b-1c1a5da49b2d\") " pod="kube-system/kube-proxy-jb5qh" May 13 07:16:32.751101 kubelet[2039]: I0513 07:16:32.751086 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cef265a4-3ee7-4389-b35b-1c1a5da49b2d-lib-modules\") pod \"kube-proxy-jb5qh\" (UID: \"cef265a4-3ee7-4389-b35b-1c1a5da49b2d\") " pod="kube-system/kube-proxy-jb5qh" May 13 07:16:32.947818 env[1159]: time="2025-05-13T07:16:32.947712015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jb5qh,Uid:cef265a4-3ee7-4389-b35b-1c1a5da49b2d,Namespace:kube-system,Attempt:0,}" May 13 07:16:33.006412 env[1159]: time="2025-05-13T07:16:33.001429019Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:16:33.006412 env[1159]: time="2025-05-13T07:16:33.001475927Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:16:33.006412 env[1159]: time="2025-05-13T07:16:33.001491115Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:16:33.006412 env[1159]: time="2025-05-13T07:16:33.001606181Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/334194e21fffafbacf1eec9856dd7b50cd19d83b39c33b1640ea52e29863255a pid=2120 runtime=io.containerd.runc.v2 May 13 07:16:33.022661 systemd[1]: run-containerd-runc-k8s.io-334194e21fffafbacf1eec9856dd7b50cd19d83b39c33b1640ea52e29863255a-runc.kfrXRv.mount: Deactivated successfully. May 13 07:16:33.027847 kubelet[2039]: I0513 07:16:33.026686 2039 topology_manager.go:215] "Topology Admit Handler" podUID="47e62eab-1a52-4d05-bc1a-b5f888f79f65" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-92lft" May 13 07:16:33.030435 systemd[1]: Started cri-containerd-334194e21fffafbacf1eec9856dd7b50cd19d83b39c33b1640ea52e29863255a.scope. May 13 07:16:33.038650 systemd[1]: Created slice kubepods-besteffort-pod47e62eab_1a52_4d05_bc1a_b5f888f79f65.slice. May 13 07:16:33.068073 kernel: kauditd_printk_skb: 7 callbacks suppressed May 13 07:16:33.068191 kernel: audit: type=1400 audit(1747120593.060:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.082577 kernel: audit: type=1400 audit(1747120593.060:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.082636 kernel: audit: type=1400 audit(1747120593.060:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.087623 kernel: audit: type=1400 audit(1747120593.060:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.093130 kernel: audit: type=1400 audit(1747120593.060:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.099268 kernel: audit: type=1400 audit(1747120593.060:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.105718 kernel: audit: type=1400 audit(1747120593.060:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.106901 env[1159]: time="2025-05-13T07:16:33.106832077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jb5qh,Uid:cef265a4-3ee7-4389-b35b-1c1a5da49b2d,Namespace:kube-system,Attempt:0,} returns sandbox id \"334194e21fffafbacf1eec9856dd7b50cd19d83b39c33b1640ea52e29863255a\"" May 13 07:16:33.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.116319 kernel: audit: type=1400 audit(1747120593.060:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.116384 kernel: audit: type=1400 audit(1747120593.060:770): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.118979 env[1159]: time="2025-05-13T07:16:33.118928241Z" level=info msg="CreateContainer within sandbox \"334194e21fffafbacf1eec9856dd7b50cd19d83b39c33b1640ea52e29863255a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 07:16:33.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.124273 kernel: audit: type=1400 audit(1747120593.067:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit: BPF prog-id=103 op=LOAD May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2120 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343139346532316666666166626163663165656339383536646437 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2120 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343139346532316666666166626163663165656339383536646437 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit: BPF prog-id=104 op=LOAD May 13 07:16:33.067000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038a020 items=0 ppid=2120 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343139346532316666666166626163663165656339383536646437 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit: BPF prog-id=105 op=LOAD May 13 07:16:33.067000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038a068 items=0 ppid=2120 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343139346532316666666166626163663165656339383536646437 May 13 07:16:33.067000 audit: BPF prog-id=105 op=UNLOAD May 13 07:16:33.067000 audit: BPF prog-id=104 op=UNLOAD May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.067000 audit: BPF prog-id=106 op=LOAD May 13 07:16:33.067000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038a478 items=0 ppid=2120 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343139346532316666666166626163663165656339383536646437 May 13 07:16:33.150826 env[1159]: time="2025-05-13T07:16:33.150772820Z" level=info msg="CreateContainer within sandbox \"334194e21fffafbacf1eec9856dd7b50cd19d83b39c33b1640ea52e29863255a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cd1d7183960c2b5e90888a65857189ff2c5a8e553c9b343bdde1f348a05fde3d\"" May 13 07:16:33.151990 env[1159]: time="2025-05-13T07:16:33.151548425Z" level=info msg="StartContainer for \"cd1d7183960c2b5e90888a65857189ff2c5a8e553c9b343bdde1f348a05fde3d\"" May 13 07:16:33.152942 kubelet[2039]: I0513 07:16:33.152897 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ngtd4\" (UniqueName: \"kubernetes.io/projected/47e62eab-1a52-4d05-bc1a-b5f888f79f65-kube-api-access-ngtd4\") pod \"tigera-operator-797db67f8-92lft\" (UID: \"47e62eab-1a52-4d05-bc1a-b5f888f79f65\") " pod="tigera-operator/tigera-operator-797db67f8-92lft" May 13 07:16:33.153005 kubelet[2039]: I0513 07:16:33.152943 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/47e62eab-1a52-4d05-bc1a-b5f888f79f65-var-lib-calico\") pod \"tigera-operator-797db67f8-92lft\" (UID: \"47e62eab-1a52-4d05-bc1a-b5f888f79f65\") " pod="tigera-operator/tigera-operator-797db67f8-92lft" May 13 07:16:33.170483 systemd[1]: Started cri-containerd-cd1d7183960c2b5e90888a65857189ff2c5a8e553c9b343bdde1f348a05fde3d.scope. May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f41b66d9568 items=0 ppid=2120 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364316437313833393630633262356539303838386136353835373138 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit: BPF prog-id=107 op=LOAD May 13 07:16:33.190000 audit[2161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000235f38 items=0 ppid=2120 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364316437313833393630633262356539303838386136353835373138 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit: BPF prog-id=108 op=LOAD May 13 07:16:33.190000 audit[2161]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000235f88 items=0 ppid=2120 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364316437313833393630633262356539303838386136353835373138 May 13 07:16:33.190000 audit: BPF prog-id=108 op=UNLOAD May 13 07:16:33.190000 audit: BPF prog-id=107 op=UNLOAD May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.190000 audit: BPF prog-id=109 op=LOAD May 13 07:16:33.190000 audit[2161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a0018 items=0 ppid=2120 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364316437313833393630633262356539303838386136353835373138 May 13 07:16:33.217813 env[1159]: time="2025-05-13T07:16:33.217698617Z" level=info msg="StartContainer for \"cd1d7183960c2b5e90888a65857189ff2c5a8e553c9b343bdde1f348a05fde3d\" returns successfully" May 13 07:16:33.280000 audit[2215]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.280000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd341dfc10 a2=0 a3=7ffd341dfbfc items=0 ppid=2172 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 07:16:33.287000 audit[2216]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.287000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe852a3000 a2=0 a3=7ffe852a2fec items=0 ppid=2172 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 07:16:33.288000 audit[2218]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.288000 audit[2217]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.288000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb76376b0 a2=0 a3=7fffb763769c items=0 ppid=2172 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 07:16:33.288000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc7d37af0 a2=0 a3=7fffc7d37adc items=0 ppid=2172 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 07:16:33.290000 audit[2219]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.290000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7faeaf90 a2=0 a3=7fff7faeaf7c items=0 ppid=2172 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 07:16:33.291000 audit[2220]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.291000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff417d5aa0 a2=0 a3=7fff417d5a8c items=0 ppid=2172 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 07:16:33.341478 env[1159]: time="2025-05-13T07:16:33.341418199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-92lft,Uid:47e62eab-1a52-4d05-bc1a-b5f888f79f65,Namespace:tigera-operator,Attempt:0,}" May 13 07:16:33.361648 env[1159]: time="2025-05-13T07:16:33.361571134Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:16:33.361799 env[1159]: time="2025-05-13T07:16:33.361620796Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:16:33.361799 env[1159]: time="2025-05-13T07:16:33.361642146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:16:33.361913 env[1159]: time="2025-05-13T07:16:33.361810392Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a1e5641edc51f4d68fdd2cc45b9576fc42504db9fb363f217e45c990801f27c pid=2228 runtime=io.containerd.runc.v2 May 13 07:16:33.373585 systemd[1]: Started cri-containerd-0a1e5641edc51f4d68fdd2cc45b9576fc42504db9fb363f217e45c990801f27c.scope. May 13 07:16:33.384000 audit[2256]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.384000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc1e6b0000 a2=0 a3=7ffc1e6affec items=0 ppid=2172 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 07:16:33.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.387000 audit: BPF prog-id=110 op=LOAD May 13 07:16:33.387000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.387000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2228 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061316535363431656463353166346436386664643263633435623935 May 13 07:16:33.387000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.387000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2228 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061316535363431656463353166346436386664643263633435623935 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit: BPF prog-id=111 op=LOAD May 13 07:16:33.388000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000352170 items=0 ppid=2228 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061316535363431656463353166346436386664643263633435623935 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2258]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.389000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc4c710150 a2=0 a3=7ffc4c71013c items=0 ppid=2172 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 07:16:33.388000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.388000 audit: BPF prog-id=112 op=LOAD May 13 07:16:33.388000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003521b8 items=0 ppid=2228 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061316535363431656463353166346436386664643263633435623935 May 13 07:16:33.389000 audit: BPF prog-id=112 op=UNLOAD May 13 07:16:33.389000 audit: BPF prog-id=111 op=UNLOAD May 13 07:16:33.389000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:33.389000 audit: BPF prog-id=113 op=LOAD May 13 07:16:33.389000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003525c8 items=0 ppid=2228 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061316535363431656463353166346436386664643263633435623935 May 13 07:16:33.393000 audit[2261]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.393000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc61cf0cf0 a2=0 a3=7ffc61cf0cdc items=0 ppid=2172 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.393000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 07:16:33.395000 audit[2262]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.395000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff79216490 a2=0 a3=7fff7921647c items=0 ppid=2172 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 07:16:33.399000 audit[2264]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.399000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffd53df70 a2=0 a3=7ffffd53df5c items=0 ppid=2172 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 07:16:33.401000 audit[2265]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.401000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff90bc3740 a2=0 a3=7fff90bc372c items=0 ppid=2172 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 07:16:33.405000 audit[2267]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.405000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc961827f0 a2=0 a3=7ffc961827dc items=0 ppid=2172 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 07:16:33.412000 audit[2270]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.412000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc0cbe360 a2=0 a3=7fffc0cbe34c items=0 ppid=2172 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 07:16:33.413000 audit[2271]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.413000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce3467ca0 a2=0 a3=7ffce3467c8c items=0 ppid=2172 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 07:16:33.418000 audit[2275]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.418000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0edcb050 a2=0 a3=7fff0edcb03c items=0 ppid=2172 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 07:16:33.420000 audit[2276]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.420000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf8e7cab0 a2=0 a3=7ffdf8e7ca9c items=0 ppid=2172 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 07:16:33.424000 audit[2284]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.424000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc32e12db0 a2=0 a3=7ffc32e12d9c items=0 ppid=2172 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 07:16:33.426154 env[1159]: time="2025-05-13T07:16:33.426111218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-92lft,Uid:47e62eab-1a52-4d05-bc1a-b5f888f79f65,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0a1e5641edc51f4d68fdd2cc45b9576fc42504db9fb363f217e45c990801f27c\"" May 13 07:16:33.428037 env[1159]: time="2025-05-13T07:16:33.428013444Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 07:16:33.433000 audit[2287]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.433000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe95f2dcb0 a2=0 a3=7ffe95f2dc9c items=0 ppid=2172 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 07:16:33.437000 audit[2290]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.437000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe61579aa0 a2=0 a3=7ffe61579a8c items=0 ppid=2172 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 07:16:33.439000 audit[2291]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.439000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff958390c0 a2=0 a3=7fff958390ac items=0 ppid=2172 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 07:16:33.441000 audit[2293]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.441000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe5bae6fb0 a2=0 a3=7ffe5bae6f9c items=0 ppid=2172 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 07:16:33.444000 audit[2296]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.444000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7b4966c0 a2=0 a3=7ffd7b4966ac items=0 ppid=2172 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 07:16:33.446000 audit[2297]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.446000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd05ea2e90 a2=0 a3=7ffd05ea2e7c items=0 ppid=2172 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 07:16:33.448000 audit[2299]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 07:16:33.448000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcb5aca5f0 a2=0 a3=7ffcb5aca5dc items=0 ppid=2172 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 07:16:33.473000 audit[2305]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:33.473000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff0aaa32e0 a2=0 a3=7fff0aaa32cc items=0 ppid=2172 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:33.484000 audit[2305]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:33.484000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff0aaa32e0 a2=0 a3=7fff0aaa32cc items=0 ppid=2172 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:33.485000 audit[2310]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.485000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc3cb798d0 a2=0 a3=7ffc3cb798bc items=0 ppid=2172 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 07:16:33.488000 audit[2312]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.488000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3de89970 a2=0 a3=7ffe3de8995c items=0 ppid=2172 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 07:16:33.491000 audit[2315]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.491000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffea7ff04c0 a2=0 a3=7ffea7ff04ac items=0 ppid=2172 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 07:16:33.493000 audit[2316]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.493000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe52a39c20 a2=0 a3=7ffe52a39c0c items=0 ppid=2172 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 07:16:33.495000 audit[2318]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.495000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff48520c20 a2=0 a3=7fff48520c0c items=0 ppid=2172 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 07:16:33.496000 audit[2319]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.496000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff19a58a20 a2=0 a3=7fff19a58a0c items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 07:16:33.499000 audit[2321]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.499000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf7a02040 a2=0 a3=7ffcf7a0202c items=0 ppid=2172 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 07:16:33.502000 audit[2324]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.502000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff513ddb70 a2=0 a3=7fff513ddb5c items=0 ppid=2172 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 07:16:33.504000 audit[2325]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.504000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcd7bf740 a2=0 a3=7ffdcd7bf72c items=0 ppid=2172 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 07:16:33.506000 audit[2327]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.506000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe48cb6910 a2=0 a3=7ffe48cb68fc items=0 ppid=2172 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 07:16:33.512000 audit[2328]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.512000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe604a8b20 a2=0 a3=7ffe604a8b0c items=0 ppid=2172 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 07:16:33.519000 audit[2330]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.519000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3ebd2180 a2=0 a3=7fff3ebd216c items=0 ppid=2172 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 07:16:33.530000 audit[2333]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.530000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdeba54d40 a2=0 a3=7ffdeba54d2c items=0 ppid=2172 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 07:16:33.533000 audit[2336]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.533000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe34f61560 a2=0 a3=7ffe34f6154c items=0 ppid=2172 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 07:16:33.534000 audit[2337]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.534000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe12552f50 a2=0 a3=7ffe12552f3c items=0 ppid=2172 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 07:16:33.537000 audit[2339]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.537000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5b806760 a2=0 a3=7ffc5b80674c items=0 ppid=2172 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 07:16:33.541000 audit[2342]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.541000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffec56dbc40 a2=0 a3=7ffec56dbc2c items=0 ppid=2172 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 07:16:33.542000 audit[2343]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.542000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5bdb52e0 a2=0 a3=7ffc5bdb52cc items=0 ppid=2172 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 07:16:33.544000 audit[2345]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.544000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffeaebf2a0 a2=0 a3=7fffeaebf28c items=0 ppid=2172 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 07:16:33.545000 audit[2346]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.545000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffba77f820 a2=0 a3=7fffba77f80c items=0 ppid=2172 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 07:16:33.548000 audit[2348]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.548000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd73a6af10 a2=0 a3=7ffd73a6aefc items=0 ppid=2172 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 07:16:33.551000 audit[2351]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 07:16:33.551000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2bc4c6a0 a2=0 a3=7ffd2bc4c68c items=0 ppid=2172 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 07:16:33.554000 audit[2353]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 07:16:33.554000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc6469a860 a2=0 a3=7ffc6469a84c items=0 ppid=2172 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.554000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:33.555000 audit[2353]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 07:16:33.555000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc6469a860 a2=0 a3=7ffc6469a84c items=0 ppid=2172 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:33.555000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:35.087635 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1890493458.mount: Deactivated successfully. May 13 07:16:36.280401 env[1159]: time="2025-05-13T07:16:36.280323899Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:36.283089 env[1159]: time="2025-05-13T07:16:36.283024613Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:36.287321 env[1159]: time="2025-05-13T07:16:36.286183815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:36.289659 env[1159]: time="2025-05-13T07:16:36.289618173Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:36.291086 env[1159]: time="2025-05-13T07:16:36.291045549Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 13 07:16:36.301473 env[1159]: time="2025-05-13T07:16:36.301443080Z" level=info msg="CreateContainer within sandbox \"0a1e5641edc51f4d68fdd2cc45b9576fc42504db9fb363f217e45c990801f27c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 07:16:36.331926 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1883933405.mount: Deactivated successfully. May 13 07:16:36.338014 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1597577384.mount: Deactivated successfully. May 13 07:16:36.339265 env[1159]: time="2025-05-13T07:16:36.339213093Z" level=info msg="CreateContainer within sandbox \"0a1e5641edc51f4d68fdd2cc45b9576fc42504db9fb363f217e45c990801f27c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f101c21ab3b57e998789336539e393f33d4696ec6ec9a72750ca4f8c2114efca\"" May 13 07:16:36.342108 env[1159]: time="2025-05-13T07:16:36.341807347Z" level=info msg="StartContainer for \"f101c21ab3b57e998789336539e393f33d4696ec6ec9a72750ca4f8c2114efca\"" May 13 07:16:36.379811 systemd[1]: Started cri-containerd-f101c21ab3b57e998789336539e393f33d4696ec6ec9a72750ca4f8c2114efca.scope. May 13 07:16:36.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.396000 audit: BPF prog-id=114 op=LOAD May 13 07:16:36.398000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2228 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:36.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303163323161623362353765393938373839333336353339653339 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2228 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:36.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303163323161623362353765393938373839333336353339653339 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.398000 audit: BPF prog-id=115 op=LOAD May 13 07:16:36.398000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000191370 items=0 ppid=2228 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:36.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303163323161623362353765393938373839333336353339653339 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.399000 audit: BPF prog-id=116 op=LOAD May 13 07:16:36.399000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001913b8 items=0 ppid=2228 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:36.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303163323161623362353765393938373839333336353339653339 May 13 07:16:36.400000 audit: BPF prog-id=116 op=UNLOAD May 13 07:16:36.400000 audit: BPF prog-id=115 op=UNLOAD May 13 07:16:36.400000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:36.400000 audit: BPF prog-id=117 op=LOAD May 13 07:16:36.400000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001917c8 items=0 ppid=2228 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:36.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303163323161623362353765393938373839333336353339653339 May 13 07:16:36.419091 env[1159]: time="2025-05-13T07:16:36.419047442Z" level=info msg="StartContainer for \"f101c21ab3b57e998789336539e393f33d4696ec6ec9a72750ca4f8c2114efca\" returns successfully" May 13 07:16:37.037219 kubelet[2039]: I0513 07:16:37.035506 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-jb5qh" podStartSLOduration=5.035436257 podStartE2EDuration="5.035436257s" podCreationTimestamp="2025-05-13 07:16:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 07:16:34.023236629 +0000 UTC m=+15.390472184" watchObservedRunningTime="2025-05-13 07:16:37.035436257 +0000 UTC m=+18.402671802" May 13 07:16:38.938053 kubelet[2039]: I0513 07:16:38.937951 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-92lft" podStartSLOduration=4.070887489 podStartE2EDuration="6.937915585s" podCreationTimestamp="2025-05-13 07:16:32 +0000 UTC" firstStartedPulling="2025-05-13 07:16:33.427432455 +0000 UTC m=+14.794667910" lastFinishedPulling="2025-05-13 07:16:36.294460511 +0000 UTC m=+17.661696006" observedRunningTime="2025-05-13 07:16:37.039524721 +0000 UTC m=+18.406760226" watchObservedRunningTime="2025-05-13 07:16:38.937915585 +0000 UTC m=+20.305151090" May 13 07:16:39.644000 audit[2394]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:39.648044 kernel: kauditd_printk_skb: 357 callbacks suppressed May 13 07:16:39.648138 kernel: audit: type=1325 audit(1747120599.644:873): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:39.644000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd046c45b0 a2=0 a3=7ffd046c459c items=0 ppid=2172 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:39.659562 kernel: audit: type=1300 audit(1747120599.644:873): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd046c45b0 a2=0 a3=7ffd046c459c items=0 ppid=2172 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:39.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:39.662000 audit[2394]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:39.670886 kernel: audit: type=1327 audit(1747120599.644:873): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:39.671004 kernel: audit: type=1325 audit(1747120599.662:874): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:39.671038 kernel: audit: type=1300 audit(1747120599.662:874): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd046c45b0 a2=0 a3=0 items=0 ppid=2172 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:39.662000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd046c45b0 a2=0 a3=0 items=0 ppid=2172 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:39.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:39.682070 kernel: audit: type=1327 audit(1747120599.662:874): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:39.723000 audit[2396]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:39.729295 kernel: audit: type=1325 audit(1747120599.723:875): table=filter:91 family=2 entries=17 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:39.723000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffe5f51d5a0 a2=0 a3=7ffe5f51d58c items=0 ppid=2172 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:39.746280 kernel: audit: type=1300 audit(1747120599.723:875): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffe5f51d5a0 a2=0 a3=7ffe5f51d58c items=0 ppid=2172 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:39.723000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:39.752293 kernel: audit: type=1327 audit(1747120599.723:875): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:39.738000 audit[2396]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:39.758294 kernel: audit: type=1325 audit(1747120599.738:876): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:39.738000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe5f51d5a0 a2=0 a3=0 items=0 ppid=2172 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:39.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:39.763923 kubelet[2039]: I0513 07:16:39.763884 2039 topology_manager.go:215] "Topology Admit Handler" podUID="95347443-e5cf-46e2-9fec-dc766db89a4c" podNamespace="calico-system" podName="calico-typha-5ccf7f5d5-wn26j" May 13 07:16:39.769603 systemd[1]: Created slice kubepods-besteffort-pod95347443_e5cf_46e2_9fec_dc766db89a4c.slice. May 13 07:16:39.893218 kubelet[2039]: I0513 07:16:39.893147 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/95347443-e5cf-46e2-9fec-dc766db89a4c-tigera-ca-bundle\") pod \"calico-typha-5ccf7f5d5-wn26j\" (UID: \"95347443-e5cf-46e2-9fec-dc766db89a4c\") " pod="calico-system/calico-typha-5ccf7f5d5-wn26j" May 13 07:16:39.893218 kubelet[2039]: I0513 07:16:39.893205 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/95347443-e5cf-46e2-9fec-dc766db89a4c-typha-certs\") pod \"calico-typha-5ccf7f5d5-wn26j\" (UID: \"95347443-e5cf-46e2-9fec-dc766db89a4c\") " pod="calico-system/calico-typha-5ccf7f5d5-wn26j" May 13 07:16:39.893218 kubelet[2039]: I0513 07:16:39.893235 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qj9d8\" (UniqueName: \"kubernetes.io/projected/95347443-e5cf-46e2-9fec-dc766db89a4c-kube-api-access-qj9d8\") pod \"calico-typha-5ccf7f5d5-wn26j\" (UID: \"95347443-e5cf-46e2-9fec-dc766db89a4c\") " pod="calico-system/calico-typha-5ccf7f5d5-wn26j" May 13 07:16:40.079705 env[1159]: time="2025-05-13T07:16:40.079477701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5ccf7f5d5-wn26j,Uid:95347443-e5cf-46e2-9fec-dc766db89a4c,Namespace:calico-system,Attempt:0,}" May 13 07:16:40.083977 kubelet[2039]: I0513 07:16:40.083846 2039 topology_manager.go:215] "Topology Admit Handler" podUID="b2c947a1-97ee-4ee3-b6cc-b1e8beae1436" podNamespace="calico-system" podName="calico-node-vxn9n" May 13 07:16:40.092260 systemd[1]: Created slice kubepods-besteffort-podb2c947a1_97ee_4ee3_b6cc_b1e8beae1436.slice. May 13 07:16:40.126639 env[1159]: time="2025-05-13T07:16:40.126564079Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:16:40.126791 env[1159]: time="2025-05-13T07:16:40.126638048Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:16:40.126791 env[1159]: time="2025-05-13T07:16:40.126668254Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:16:40.126859 env[1159]: time="2025-05-13T07:16:40.126815841Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03d2013da60a21c1d073a5221e30a8ff2ed1b509d477d0b1f43629924e904253 pid=2405 runtime=io.containerd.runc.v2 May 13 07:16:40.160155 systemd[1]: Started cri-containerd-03d2013da60a21c1d073a5221e30a8ff2ed1b509d477d0b1f43629924e904253.scope. May 13 07:16:40.195219 kubelet[2039]: I0513 07:16:40.195170 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-cni-bin-dir\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195219 kubelet[2039]: I0513 07:16:40.195210 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-flexvol-driver-host\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195415 kubelet[2039]: I0513 07:16:40.195233 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-var-lib-calico\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195415 kubelet[2039]: I0513 07:16:40.195277 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-policysync\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195415 kubelet[2039]: I0513 07:16:40.195296 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-var-run-calico\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195415 kubelet[2039]: I0513 07:16:40.195343 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-lib-modules\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195415 kubelet[2039]: I0513 07:16:40.195364 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-node-certs\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195556 kubelet[2039]: I0513 07:16:40.195383 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-xtables-lock\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195556 kubelet[2039]: I0513 07:16:40.195415 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-tigera-ca-bundle\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195556 kubelet[2039]: I0513 07:16:40.195435 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-cni-net-dir\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195556 kubelet[2039]: I0513 07:16:40.195452 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-cni-log-dir\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.195556 kubelet[2039]: I0513 07:16:40.195469 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9s7dt\" (UniqueName: \"kubernetes.io/projected/b2c947a1-97ee-4ee3-b6cc-b1e8beae1436-kube-api-access-9s7dt\") pod \"calico-node-vxn9n\" (UID: \"b2c947a1-97ee-4ee3-b6cc-b1e8beae1436\") " pod="calico-system/calico-node-vxn9n" May 13 07:16:40.229871 kubelet[2039]: I0513 07:16:40.229817 2039 topology_manager.go:215] "Topology Admit Handler" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" podNamespace="calico-system" podName="csi-node-driver-ncrlc" May 13 07:16:40.230112 kubelet[2039]: E0513 07:16:40.230079 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:40.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.256000 audit: BPF prog-id=118 op=LOAD May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2405 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643230313364613630613231633164303733613532323165333061 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2405 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643230313364613630613231633164303733613532323165333061 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit: BPF prog-id=119 op=LOAD May 13 07:16:40.257000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003805f0 items=0 ppid=2405 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643230313364613630613231633164303733613532323165333061 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.257000 audit: BPF prog-id=120 op=LOAD May 13 07:16:40.257000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000380638 items=0 ppid=2405 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643230313364613630613231633164303733613532323165333061 May 13 07:16:40.258000 audit: BPF prog-id=120 op=UNLOAD May 13 07:16:40.258000 audit: BPF prog-id=119 op=UNLOAD May 13 07:16:40.258000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.258000 audit: BPF prog-id=121 op=LOAD May 13 07:16:40.258000 audit[2417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000380a48 items=0 ppid=2405 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643230313364613630613231633164303733613532323165333061 May 13 07:16:40.291953 env[1159]: time="2025-05-13T07:16:40.291902767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5ccf7f5d5-wn26j,Uid:95347443-e5cf-46e2-9fec-dc766db89a4c,Namespace:calico-system,Attempt:0,} returns sandbox id \"03d2013da60a21c1d073a5221e30a8ff2ed1b509d477d0b1f43629924e904253\"" May 13 07:16:40.293810 env[1159]: time="2025-05-13T07:16:40.293773224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 07:16:40.301655 kubelet[2039]: E0513 07:16:40.301618 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.301806 kubelet[2039]: W0513 07:16:40.301790 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.301931 kubelet[2039]: E0513 07:16:40.301913 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.304771 kubelet[2039]: E0513 07:16:40.304736 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.304928 kubelet[2039]: W0513 07:16:40.304911 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.305030 kubelet[2039]: E0513 07:16:40.305015 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.305313 kubelet[2039]: E0513 07:16:40.305301 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.305418 kubelet[2039]: W0513 07:16:40.305404 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.305511 kubelet[2039]: E0513 07:16:40.305498 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.305768 kubelet[2039]: E0513 07:16:40.305756 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.305858 kubelet[2039]: W0513 07:16:40.305845 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.305964 kubelet[2039]: E0513 07:16:40.305951 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.306224 kubelet[2039]: E0513 07:16:40.306211 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.306339 kubelet[2039]: W0513 07:16:40.306324 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.306427 kubelet[2039]: E0513 07:16:40.306415 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.306669 kubelet[2039]: E0513 07:16:40.306658 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.306753 kubelet[2039]: W0513 07:16:40.306741 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.306828 kubelet[2039]: E0513 07:16:40.306816 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.307514 kubelet[2039]: E0513 07:16:40.307484 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.307514 kubelet[2039]: W0513 07:16:40.307508 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.307604 kubelet[2039]: E0513 07:16:40.307528 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.308204 kubelet[2039]: E0513 07:16:40.307903 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.308204 kubelet[2039]: W0513 07:16:40.307921 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.308204 kubelet[2039]: E0513 07:16:40.307931 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.308597 kubelet[2039]: E0513 07:16:40.308574 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.308597 kubelet[2039]: W0513 07:16:40.308591 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.308694 kubelet[2039]: E0513 07:16:40.308602 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.308948 kubelet[2039]: E0513 07:16:40.308910 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.308948 kubelet[2039]: W0513 07:16:40.308927 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.308948 kubelet[2039]: E0513 07:16:40.308939 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.309227 kubelet[2039]: E0513 07:16:40.309204 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.309227 kubelet[2039]: W0513 07:16:40.309218 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.309424 kubelet[2039]: E0513 07:16:40.309229 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.309681 kubelet[2039]: E0513 07:16:40.309591 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.309681 kubelet[2039]: W0513 07:16:40.309607 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.309681 kubelet[2039]: E0513 07:16:40.309620 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.309958 kubelet[2039]: E0513 07:16:40.309940 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.309958 kubelet[2039]: W0513 07:16:40.309955 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.310058 kubelet[2039]: E0513 07:16:40.309966 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.310225 kubelet[2039]: E0513 07:16:40.310207 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.310225 kubelet[2039]: W0513 07:16:40.310221 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.310379 kubelet[2039]: E0513 07:16:40.310231 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.310545 kubelet[2039]: E0513 07:16:40.310528 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.310545 kubelet[2039]: W0513 07:16:40.310542 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.310646 kubelet[2039]: E0513 07:16:40.310552 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.310826 kubelet[2039]: E0513 07:16:40.310807 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.310826 kubelet[2039]: W0513 07:16:40.310822 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.310933 kubelet[2039]: E0513 07:16:40.310832 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.311104 kubelet[2039]: E0513 07:16:40.311085 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.311104 kubelet[2039]: W0513 07:16:40.311099 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.311206 kubelet[2039]: E0513 07:16:40.311109 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.311415 kubelet[2039]: E0513 07:16:40.311398 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.311415 kubelet[2039]: W0513 07:16:40.311411 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.311518 kubelet[2039]: E0513 07:16:40.311421 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.311672 kubelet[2039]: E0513 07:16:40.311656 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.311672 kubelet[2039]: W0513 07:16:40.311669 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.311770 kubelet[2039]: E0513 07:16:40.311679 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.311957 kubelet[2039]: E0513 07:16:40.311925 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.311957 kubelet[2039]: W0513 07:16:40.311938 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.311957 kubelet[2039]: E0513 07:16:40.311947 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.312219 kubelet[2039]: E0513 07:16:40.312203 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.312219 kubelet[2039]: W0513 07:16:40.312217 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.312344 kubelet[2039]: E0513 07:16:40.312226 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.313091 kubelet[2039]: E0513 07:16:40.313059 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.313190 kubelet[2039]: W0513 07:16:40.313173 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.313334 kubelet[2039]: E0513 07:16:40.313316 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.396133 env[1159]: time="2025-05-13T07:16:40.396089337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vxn9n,Uid:b2c947a1-97ee-4ee3-b6cc-b1e8beae1436,Namespace:calico-system,Attempt:0,}" May 13 07:16:40.398538 kubelet[2039]: E0513 07:16:40.398513 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.398538 kubelet[2039]: W0513 07:16:40.398536 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.398678 kubelet[2039]: E0513 07:16:40.398555 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.398678 kubelet[2039]: I0513 07:16:40.398601 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/86f7d333-22c4-4d19-b6ba-f4cf43ce1598-kubelet-dir\") pod \"csi-node-driver-ncrlc\" (UID: \"86f7d333-22c4-4d19-b6ba-f4cf43ce1598\") " pod="calico-system/csi-node-driver-ncrlc" May 13 07:16:40.399186 kubelet[2039]: E0513 07:16:40.399021 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.399186 kubelet[2039]: W0513 07:16:40.399037 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.399186 kubelet[2039]: E0513 07:16:40.399057 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.399186 kubelet[2039]: I0513 07:16:40.399075 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/86f7d333-22c4-4d19-b6ba-f4cf43ce1598-registration-dir\") pod \"csi-node-driver-ncrlc\" (UID: \"86f7d333-22c4-4d19-b6ba-f4cf43ce1598\") " pod="calico-system/csi-node-driver-ncrlc" May 13 07:16:40.401421 kubelet[2039]: E0513 07:16:40.399825 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.401421 kubelet[2039]: W0513 07:16:40.399847 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.401421 kubelet[2039]: E0513 07:16:40.399866 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.401421 kubelet[2039]: I0513 07:16:40.399889 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hwf2z\" (UniqueName: \"kubernetes.io/projected/86f7d333-22c4-4d19-b6ba-f4cf43ce1598-kube-api-access-hwf2z\") pod \"csi-node-driver-ncrlc\" (UID: \"86f7d333-22c4-4d19-b6ba-f4cf43ce1598\") " pod="calico-system/csi-node-driver-ncrlc" May 13 07:16:40.401421 kubelet[2039]: E0513 07:16:40.400218 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.401421 kubelet[2039]: W0513 07:16:40.400238 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.401421 kubelet[2039]: E0513 07:16:40.400289 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.401421 kubelet[2039]: E0513 07:16:40.400499 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.401421 kubelet[2039]: W0513 07:16:40.400532 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.401749 kubelet[2039]: E0513 07:16:40.400551 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.401749 kubelet[2039]: E0513 07:16:40.400829 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.401749 kubelet[2039]: W0513 07:16:40.400840 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.401749 kubelet[2039]: E0513 07:16:40.400856 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.401749 kubelet[2039]: E0513 07:16:40.401067 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.401749 kubelet[2039]: W0513 07:16:40.401077 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.401749 kubelet[2039]: E0513 07:16:40.401123 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.401960 kubelet[2039]: E0513 07:16:40.401947 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.402025 kubelet[2039]: W0513 07:16:40.402012 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.402133 kubelet[2039]: E0513 07:16:40.402108 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.402186 kubelet[2039]: I0513 07:16:40.402140 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/86f7d333-22c4-4d19-b6ba-f4cf43ce1598-varrun\") pod \"csi-node-driver-ncrlc\" (UID: \"86f7d333-22c4-4d19-b6ba-f4cf43ce1598\") " pod="calico-system/csi-node-driver-ncrlc" May 13 07:16:40.402753 kubelet[2039]: E0513 07:16:40.402721 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.402838 kubelet[2039]: W0513 07:16:40.402825 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.402920 kubelet[2039]: E0513 07:16:40.402907 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.403108 kubelet[2039]: E0513 07:16:40.403087 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.403108 kubelet[2039]: W0513 07:16:40.403103 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.403108 kubelet[2039]: E0513 07:16:40.403121 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.403313 kubelet[2039]: I0513 07:16:40.403145 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/86f7d333-22c4-4d19-b6ba-f4cf43ce1598-socket-dir\") pod \"csi-node-driver-ncrlc\" (UID: \"86f7d333-22c4-4d19-b6ba-f4cf43ce1598\") " pod="calico-system/csi-node-driver-ncrlc" May 13 07:16:40.403351 kubelet[2039]: E0513 07:16:40.403334 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.403351 kubelet[2039]: W0513 07:16:40.403345 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.403441 kubelet[2039]: E0513 07:16:40.403355 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.403543 kubelet[2039]: E0513 07:16:40.403493 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.403543 kubelet[2039]: W0513 07:16:40.403509 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.403543 kubelet[2039]: E0513 07:16:40.403517 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.403902 kubelet[2039]: E0513 07:16:40.403862 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.403902 kubelet[2039]: W0513 07:16:40.403875 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.403902 kubelet[2039]: E0513 07:16:40.403890 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.404045 kubelet[2039]: E0513 07:16:40.404025 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.404045 kubelet[2039]: W0513 07:16:40.404039 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.404500 kubelet[2039]: E0513 07:16:40.404466 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.404718 kubelet[2039]: E0513 07:16:40.404680 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.404718 kubelet[2039]: W0513 07:16:40.404695 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.404835 kubelet[2039]: E0513 07:16:40.404720 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.422648 env[1159]: time="2025-05-13T07:16:40.422567798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:16:40.422648 env[1159]: time="2025-05-13T07:16:40.422614476Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:16:40.422843 env[1159]: time="2025-05-13T07:16:40.422628612Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:16:40.423161 env[1159]: time="2025-05-13T07:16:40.423120425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce pid=2484 runtime=io.containerd.runc.v2 May 13 07:16:40.436468 systemd[1]: Started cri-containerd-f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce.scope. May 13 07:16:40.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.454000 audit: BPF prog-id=122 op=LOAD May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2484 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636623537643631343034363936323130323439346231363564633463 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2484 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636623537643631343034363936323130323439346231363564633463 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit: BPF prog-id=123 op=LOAD May 13 07:16:40.455000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000382810 items=0 ppid=2484 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636623537643631343034363936323130323439346231363564633463 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit: BPF prog-id=124 op=LOAD May 13 07:16:40.455000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000382858 items=0 ppid=2484 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636623537643631343034363936323130323439346231363564633463 May 13 07:16:40.455000 audit: BPF prog-id=124 op=UNLOAD May 13 07:16:40.455000 audit: BPF prog-id=123 op=UNLOAD May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:40.455000 audit: BPF prog-id=125 op=LOAD May 13 07:16:40.455000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000382c68 items=0 ppid=2484 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636623537643631343034363936323130323439346231363564633463 May 13 07:16:40.473823 env[1159]: time="2025-05-13T07:16:40.473768220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vxn9n,Uid:b2c947a1-97ee-4ee3-b6cc-b1e8beae1436,Namespace:calico-system,Attempt:0,} returns sandbox id \"f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce\"" May 13 07:16:40.505878 kubelet[2039]: E0513 07:16:40.505674 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.505878 kubelet[2039]: W0513 07:16:40.505694 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.505878 kubelet[2039]: E0513 07:16:40.505735 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.506650 kubelet[2039]: E0513 07:16:40.506146 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.506650 kubelet[2039]: W0513 07:16:40.506159 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.506650 kubelet[2039]: E0513 07:16:40.506173 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.506650 kubelet[2039]: E0513 07:16:40.506488 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.506650 kubelet[2039]: W0513 07:16:40.506501 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.506650 kubelet[2039]: E0513 07:16:40.506517 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.507358 kubelet[2039]: E0513 07:16:40.506942 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.507358 kubelet[2039]: W0513 07:16:40.506955 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.507358 kubelet[2039]: E0513 07:16:40.507086 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.507358 kubelet[2039]: E0513 07:16:40.507191 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.507358 kubelet[2039]: W0513 07:16:40.507200 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.507358 kubelet[2039]: E0513 07:16:40.507211 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.507763 kubelet[2039]: E0513 07:16:40.507633 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.507763 kubelet[2039]: W0513 07:16:40.507646 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.507763 kubelet[2039]: E0513 07:16:40.507657 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.508283 kubelet[2039]: E0513 07:16:40.507961 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.508283 kubelet[2039]: W0513 07:16:40.507978 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.508283 kubelet[2039]: E0513 07:16:40.508077 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.508283 kubelet[2039]: E0513 07:16:40.508170 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.508283 kubelet[2039]: W0513 07:16:40.508178 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.508283 kubelet[2039]: E0513 07:16:40.508265 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.508589 kubelet[2039]: E0513 07:16:40.508576 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.508683 kubelet[2039]: W0513 07:16:40.508670 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.508800 kubelet[2039]: E0513 07:16:40.508774 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.509299 kubelet[2039]: E0513 07:16:40.508965 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.509299 kubelet[2039]: W0513 07:16:40.508984 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.509299 kubelet[2039]: E0513 07:16:40.509004 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.509299 kubelet[2039]: E0513 07:16:40.509143 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.509299 kubelet[2039]: W0513 07:16:40.509153 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.509299 kubelet[2039]: E0513 07:16:40.509164 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.509516 kubelet[2039]: E0513 07:16:40.509334 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.509516 kubelet[2039]: W0513 07:16:40.509344 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.509516 kubelet[2039]: E0513 07:16:40.509354 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.509516 kubelet[2039]: E0513 07:16:40.509508 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.509516 kubelet[2039]: W0513 07:16:40.509518 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.509661 kubelet[2039]: E0513 07:16:40.509528 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.510074 kubelet[2039]: E0513 07:16:40.509921 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.510074 kubelet[2039]: W0513 07:16:40.509933 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.510074 kubelet[2039]: E0513 07:16:40.509955 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.510332 kubelet[2039]: E0513 07:16:40.510318 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.510411 kubelet[2039]: W0513 07:16:40.510398 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.510528 kubelet[2039]: E0513 07:16:40.510502 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.510776 kubelet[2039]: E0513 07:16:40.510764 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.510861 kubelet[2039]: W0513 07:16:40.510848 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.511001 kubelet[2039]: E0513 07:16:40.510975 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.511281 kubelet[2039]: E0513 07:16:40.511268 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.511368 kubelet[2039]: W0513 07:16:40.511355 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.511515 kubelet[2039]: E0513 07:16:40.511476 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.511757 kubelet[2039]: E0513 07:16:40.511733 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.511841 kubelet[2039]: W0513 07:16:40.511828 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.511996 kubelet[2039]: E0513 07:16:40.511972 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.512366 kubelet[2039]: E0513 07:16:40.512240 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.512494 kubelet[2039]: W0513 07:16:40.512456 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.512623 kubelet[2039]: E0513 07:16:40.512597 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.512942 kubelet[2039]: E0513 07:16:40.512929 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.513063 kubelet[2039]: W0513 07:16:40.513050 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.513206 kubelet[2039]: E0513 07:16:40.513183 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.515309 kubelet[2039]: E0513 07:16:40.513436 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.515309 kubelet[2039]: W0513 07:16:40.513451 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.515309 kubelet[2039]: E0513 07:16:40.513600 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.515309 kubelet[2039]: W0513 07:16:40.513609 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.515309 kubelet[2039]: E0513 07:16:40.513620 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.515309 kubelet[2039]: E0513 07:16:40.513881 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.515309 kubelet[2039]: W0513 07:16:40.513891 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.515309 kubelet[2039]: E0513 07:16:40.513901 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.515309 kubelet[2039]: E0513 07:16:40.514070 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.515309 kubelet[2039]: W0513 07:16:40.514085 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.515678 kubelet[2039]: E0513 07:16:40.514095 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.515678 kubelet[2039]: E0513 07:16:40.514110 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.515678 kubelet[2039]: E0513 07:16:40.514283 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.515678 kubelet[2039]: W0513 07:16:40.514293 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.515678 kubelet[2039]: E0513 07:16:40.514302 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.521152 kubelet[2039]: E0513 07:16:40.521134 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:40.521326 kubelet[2039]: W0513 07:16:40.521311 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:40.521420 kubelet[2039]: E0513 07:16:40.521405 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:40.816000 audit[2546]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:40.816000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdb6d38140 a2=0 a3=7ffdb6d3812c items=0 ppid=2172 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:40.823000 audit[2546]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:40.823000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb6d38140 a2=0 a3=0 items=0 ppid=2172 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:40.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:41.017432 systemd[1]: run-containerd-runc-k8s.io-03d2013da60a21c1d073a5221e30a8ff2ed1b509d477d0b1f43629924e904253-runc.EQX5PQ.mount: Deactivated successfully. May 13 07:16:41.903574 kubelet[2039]: E0513 07:16:41.903468 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:43.903377 kubelet[2039]: E0513 07:16:43.903333 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:43.927095 env[1159]: time="2025-05-13T07:16:43.927047851Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:43.930965 env[1159]: time="2025-05-13T07:16:43.930928477Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:43.934007 env[1159]: time="2025-05-13T07:16:43.933984296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:43.936584 env[1159]: time="2025-05-13T07:16:43.936560827Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:43.937414 env[1159]: time="2025-05-13T07:16:43.937389110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 13 07:16:43.939468 env[1159]: time="2025-05-13T07:16:43.939447599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 07:16:43.956287 env[1159]: time="2025-05-13T07:16:43.956236006Z" level=info msg="CreateContainer within sandbox \"03d2013da60a21c1d073a5221e30a8ff2ed1b509d477d0b1f43629924e904253\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 07:16:43.984218 env[1159]: time="2025-05-13T07:16:43.984179789Z" level=info msg="CreateContainer within sandbox \"03d2013da60a21c1d073a5221e30a8ff2ed1b509d477d0b1f43629924e904253\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"916fbea229a973ba51290568ddd76cc49d0ccf7913eca66caa72e56407a18739\"" May 13 07:16:43.984975 env[1159]: time="2025-05-13T07:16:43.984950264Z" level=info msg="StartContainer for \"916fbea229a973ba51290568ddd76cc49d0ccf7913eca66caa72e56407a18739\"" May 13 07:16:44.014227 systemd[1]: Started cri-containerd-916fbea229a973ba51290568ddd76cc49d0ccf7913eca66caa72e56407a18739.scope. May 13 07:16:44.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit: BPF prog-id=126 op=LOAD May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2405 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:44.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931366662656132323961393733626135313239303536386464643736 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2405 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:44.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931366662656132323961393733626135313239303536386464643736 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit: BPF prog-id=127 op=LOAD May 13 07:16:44.034000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009b570 items=0 ppid=2405 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:44.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931366662656132323961393733626135313239303536386464643736 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit: BPF prog-id=128 op=LOAD May 13 07:16:44.034000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009b5b8 items=0 ppid=2405 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:44.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931366662656132323961393733626135313239303536386464643736 May 13 07:16:44.034000 audit: BPF prog-id=128 op=UNLOAD May 13 07:16:44.034000 audit: BPF prog-id=127 op=UNLOAD May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:44.034000 audit: BPF prog-id=129 op=LOAD May 13 07:16:44.034000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b9c8 items=0 ppid=2405 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:44.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931366662656132323961393733626135313239303536386464643736 May 13 07:16:44.087825 env[1159]: time="2025-05-13T07:16:44.087780416Z" level=info msg="StartContainer for \"916fbea229a973ba51290568ddd76cc49d0ccf7913eca66caa72e56407a18739\" returns successfully" May 13 07:16:45.055469 kubelet[2039]: E0513 07:16:45.055398 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.056296 kubelet[2039]: W0513 07:16:45.056208 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.056481 kubelet[2039]: E0513 07:16:45.056447 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.057019 kubelet[2039]: E0513 07:16:45.056986 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.057189 kubelet[2039]: W0513 07:16:45.057162 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.057392 kubelet[2039]: E0513 07:16:45.057363 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.057859 kubelet[2039]: E0513 07:16:45.057830 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.058099 kubelet[2039]: W0513 07:16:45.058067 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.058307 kubelet[2039]: E0513 07:16:45.058230 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.058784 kubelet[2039]: E0513 07:16:45.058755 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.058960 kubelet[2039]: W0513 07:16:45.058932 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.059120 kubelet[2039]: E0513 07:16:45.059093 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.059643 kubelet[2039]: E0513 07:16:45.059615 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.059804 kubelet[2039]: W0513 07:16:45.059778 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.059995 kubelet[2039]: E0513 07:16:45.059955 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.060645 kubelet[2039]: E0513 07:16:45.060616 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.060909 kubelet[2039]: W0513 07:16:45.060880 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.061062 kubelet[2039]: E0513 07:16:45.061036 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.061652 kubelet[2039]: E0513 07:16:45.061623 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.061837 kubelet[2039]: W0513 07:16:45.061808 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.062109 kubelet[2039]: E0513 07:16:45.062079 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.062709 kubelet[2039]: E0513 07:16:45.062679 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.062875 kubelet[2039]: W0513 07:16:45.062847 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.063099 kubelet[2039]: E0513 07:16:45.063014 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.063720 kubelet[2039]: E0513 07:16:45.063690 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.063882 kubelet[2039]: W0513 07:16:45.063856 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.064049 kubelet[2039]: E0513 07:16:45.064020 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.068168 kubelet[2039]: E0513 07:16:45.068112 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.068518 kubelet[2039]: W0513 07:16:45.068486 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.069067 kubelet[2039]: E0513 07:16:45.069012 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.069883 kubelet[2039]: E0513 07:16:45.069854 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.070131 kubelet[2039]: W0513 07:16:45.070092 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.070551 kubelet[2039]: E0513 07:16:45.070517 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.071447 kubelet[2039]: E0513 07:16:45.071420 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.071770 kubelet[2039]: W0513 07:16:45.071680 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.072007 kubelet[2039]: E0513 07:16:45.071977 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.073076 kubelet[2039]: E0513 07:16:45.073046 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.073356 kubelet[2039]: W0513 07:16:45.073323 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.073561 kubelet[2039]: E0513 07:16:45.073532 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.074407 kubelet[2039]: E0513 07:16:45.074339 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.074715 kubelet[2039]: W0513 07:16:45.074616 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.075125 kubelet[2039]: E0513 07:16:45.075070 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.075801 kubelet[2039]: E0513 07:16:45.075772 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.076033 kubelet[2039]: W0513 07:16:45.076002 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.076208 kubelet[2039]: E0513 07:16:45.076180 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.150098 kubelet[2039]: E0513 07:16:45.150053 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.150478 kubelet[2039]: W0513 07:16:45.150442 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.150670 kubelet[2039]: E0513 07:16:45.150637 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.151358 kubelet[2039]: E0513 07:16:45.151328 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.151524 kubelet[2039]: W0513 07:16:45.151497 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.151787 kubelet[2039]: E0513 07:16:45.151755 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.152345 kubelet[2039]: E0513 07:16:45.152239 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.152345 kubelet[2039]: W0513 07:16:45.152332 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.152615 kubelet[2039]: E0513 07:16:45.152398 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.152901 kubelet[2039]: E0513 07:16:45.152866 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.152901 kubelet[2039]: W0513 07:16:45.152897 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.153096 kubelet[2039]: E0513 07:16:45.152931 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.153445 kubelet[2039]: E0513 07:16:45.153390 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.153445 kubelet[2039]: W0513 07:16:45.153428 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.153760 kubelet[2039]: E0513 07:16:45.153723 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.153949 kubelet[2039]: E0513 07:16:45.153753 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.154100 kubelet[2039]: W0513 07:16:45.154072 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.154415 kubelet[2039]: E0513 07:16:45.154355 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.154903 kubelet[2039]: E0513 07:16:45.154872 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.155089 kubelet[2039]: W0513 07:16:45.155059 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.155366 kubelet[2039]: E0513 07:16:45.155315 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.155905 kubelet[2039]: E0513 07:16:45.155868 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.156088 kubelet[2039]: W0513 07:16:45.156059 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.156393 kubelet[2039]: E0513 07:16:45.156348 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.156913 kubelet[2039]: E0513 07:16:45.156884 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.157104 kubelet[2039]: W0513 07:16:45.157075 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.157429 kubelet[2039]: E0513 07:16:45.157368 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.157913 kubelet[2039]: E0513 07:16:45.157884 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.158085 kubelet[2039]: W0513 07:16:45.158057 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.158340 kubelet[2039]: E0513 07:16:45.158292 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.158841 kubelet[2039]: E0513 07:16:45.158811 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.159030 kubelet[2039]: W0513 07:16:45.159001 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.159333 kubelet[2039]: E0513 07:16:45.159216 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.159807 kubelet[2039]: E0513 07:16:45.159778 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.159965 kubelet[2039]: W0513 07:16:45.159938 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.160218 kubelet[2039]: E0513 07:16:45.160152 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.160789 kubelet[2039]: E0513 07:16:45.160758 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.160970 kubelet[2039]: W0513 07:16:45.160941 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.161156 kubelet[2039]: E0513 07:16:45.161127 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.161660 kubelet[2039]: E0513 07:16:45.161622 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.161660 kubelet[2039]: W0513 07:16:45.161652 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.161842 kubelet[2039]: E0513 07:16:45.161681 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.162242 kubelet[2039]: E0513 07:16:45.162204 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.162242 kubelet[2039]: W0513 07:16:45.162229 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.162242 kubelet[2039]: E0513 07:16:45.162294 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.162856 kubelet[2039]: E0513 07:16:45.162821 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.162856 kubelet[2039]: W0513 07:16:45.162852 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.163102 kubelet[2039]: E0513 07:16:45.163069 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.163477 kubelet[2039]: E0513 07:16:45.163447 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.163477 kubelet[2039]: W0513 07:16:45.163470 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.163477 kubelet[2039]: E0513 07:16:45.163482 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.164082 kubelet[2039]: E0513 07:16:45.164050 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:45.164082 kubelet[2039]: W0513 07:16:45.164063 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:45.164082 kubelet[2039]: E0513 07:16:45.164072 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:45.903965 kubelet[2039]: E0513 07:16:45.903826 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:46.054214 kubelet[2039]: I0513 07:16:46.054141 2039 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 07:16:46.083336 kubelet[2039]: E0513 07:16:46.083230 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.083336 kubelet[2039]: W0513 07:16:46.083336 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.083813 kubelet[2039]: E0513 07:16:46.083367 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.083813 kubelet[2039]: E0513 07:16:46.083750 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.083813 kubelet[2039]: W0513 07:16:46.083771 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.083813 kubelet[2039]: E0513 07:16:46.083791 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.084167 kubelet[2039]: E0513 07:16:46.084141 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.084228 kubelet[2039]: W0513 07:16:46.084169 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.084228 kubelet[2039]: E0513 07:16:46.084188 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.084721 kubelet[2039]: E0513 07:16:46.084666 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.084782 kubelet[2039]: W0513 07:16:46.084724 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.084782 kubelet[2039]: E0513 07:16:46.084747 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.085151 kubelet[2039]: E0513 07:16:46.085127 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.085213 kubelet[2039]: W0513 07:16:46.085153 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.085213 kubelet[2039]: E0513 07:16:46.085171 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.085655 kubelet[2039]: E0513 07:16:46.085630 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.085713 kubelet[2039]: W0513 07:16:46.085657 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.085713 kubelet[2039]: E0513 07:16:46.085676 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.086057 kubelet[2039]: E0513 07:16:46.086034 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.086122 kubelet[2039]: W0513 07:16:46.086060 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.086122 kubelet[2039]: E0513 07:16:46.086079 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.086559 kubelet[2039]: E0513 07:16:46.086532 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.086627 kubelet[2039]: W0513 07:16:46.086559 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.086627 kubelet[2039]: E0513 07:16:46.086601 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.087007 kubelet[2039]: E0513 07:16:46.086983 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.087077 kubelet[2039]: W0513 07:16:46.087009 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.087129 kubelet[2039]: E0513 07:16:46.087103 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.087550 kubelet[2039]: E0513 07:16:46.087524 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.087641 kubelet[2039]: W0513 07:16:46.087615 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.087697 kubelet[2039]: E0513 07:16:46.087646 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.088047 kubelet[2039]: E0513 07:16:46.088023 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.088109 kubelet[2039]: W0513 07:16:46.088048 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.088109 kubelet[2039]: E0513 07:16:46.088066 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.088528 kubelet[2039]: E0513 07:16:46.088503 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.088588 kubelet[2039]: W0513 07:16:46.088529 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.088588 kubelet[2039]: E0513 07:16:46.088548 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.089053 kubelet[2039]: E0513 07:16:46.089026 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.089116 kubelet[2039]: W0513 07:16:46.089053 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.089116 kubelet[2039]: E0513 07:16:46.089074 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.089455 kubelet[2039]: E0513 07:16:46.089431 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.089524 kubelet[2039]: W0513 07:16:46.089456 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.089524 kubelet[2039]: E0513 07:16:46.089474 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.089895 kubelet[2039]: E0513 07:16:46.089866 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.089954 kubelet[2039]: W0513 07:16:46.089896 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.089954 kubelet[2039]: E0513 07:16:46.089915 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.138230 env[1159]: time="2025-05-13T07:16:46.138142737Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:46.141126 env[1159]: time="2025-05-13T07:16:46.141070445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:46.143551 env[1159]: time="2025-05-13T07:16:46.143494638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:46.146155 env[1159]: time="2025-05-13T07:16:46.146129772Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:46.147846 env[1159]: time="2025-05-13T07:16:46.147781351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 07:16:46.153033 env[1159]: time="2025-05-13T07:16:46.152999338Z" level=info msg="CreateContainer within sandbox \"f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 07:16:46.166495 kubelet[2039]: E0513 07:16:46.165181 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.166495 kubelet[2039]: W0513 07:16:46.165297 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.166495 kubelet[2039]: E0513 07:16:46.165328 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.167081 kubelet[2039]: E0513 07:16:46.167055 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.167158 kubelet[2039]: W0513 07:16:46.167088 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.167158 kubelet[2039]: E0513 07:16:46.167113 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.167629 kubelet[2039]: E0513 07:16:46.167570 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.167629 kubelet[2039]: W0513 07:16:46.167603 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.167629 kubelet[2039]: E0513 07:16:46.167626 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.168174 kubelet[2039]: E0513 07:16:46.168138 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.168174 kubelet[2039]: W0513 07:16:46.168171 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.168313 kubelet[2039]: E0513 07:16:46.168200 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.169033 kubelet[2039]: E0513 07:16:46.169010 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.169091 kubelet[2039]: W0513 07:16:46.169038 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.169091 kubelet[2039]: E0513 07:16:46.169065 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.169489 kubelet[2039]: E0513 07:16:46.169447 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.169489 kubelet[2039]: W0513 07:16:46.169478 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.169683 kubelet[2039]: E0513 07:16:46.169637 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.169938 kubelet[2039]: E0513 07:16:46.169913 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.169993 kubelet[2039]: W0513 07:16:46.169943 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.172520 kubelet[2039]: E0513 07:16:46.172469 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.172949 kubelet[2039]: E0513 07:16:46.172914 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.173026 kubelet[2039]: W0513 07:16:46.172950 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.173612 kubelet[2039]: E0513 07:16:46.173554 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.173789 kubelet[2039]: E0513 07:16:46.173722 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.173789 kubelet[2039]: W0513 07:16:46.173753 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.173946 kubelet[2039]: E0513 07:16:46.173913 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.176445 kubelet[2039]: E0513 07:16:46.176401 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.176445 kubelet[2039]: W0513 07:16:46.176434 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.176627 kubelet[2039]: E0513 07:16:46.176613 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.176944 kubelet[2039]: E0513 07:16:46.176923 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.177013 kubelet[2039]: W0513 07:16:46.176949 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.177150 kubelet[2039]: E0513 07:16:46.177108 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.177456 kubelet[2039]: E0513 07:16:46.177433 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.177508 kubelet[2039]: W0513 07:16:46.177463 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.177508 kubelet[2039]: E0513 07:16:46.177495 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.177829 kubelet[2039]: E0513 07:16:46.177794 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.177884 kubelet[2039]: W0513 07:16:46.177827 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.177884 kubelet[2039]: E0513 07:16:46.177857 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.178237 kubelet[2039]: E0513 07:16:46.178215 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.178373 kubelet[2039]: W0513 07:16:46.178243 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.178416 kubelet[2039]: E0513 07:16:46.178385 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.179172 kubelet[2039]: E0513 07:16:46.179145 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.179263 kubelet[2039]: W0513 07:16:46.179175 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.179369 kubelet[2039]: E0513 07:16:46.179343 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.179633 kubelet[2039]: E0513 07:16:46.179606 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.179678 kubelet[2039]: W0513 07:16:46.179634 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.179678 kubelet[2039]: E0513 07:16:46.179657 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.179987 kubelet[2039]: E0513 07:16:46.179962 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.180031 kubelet[2039]: W0513 07:16:46.179991 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.180031 kubelet[2039]: E0513 07:16:46.180010 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.180928 kubelet[2039]: E0513 07:16:46.180898 2039 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 07:16:46.180989 kubelet[2039]: W0513 07:16:46.180930 2039 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 07:16:46.180989 kubelet[2039]: E0513 07:16:46.180953 2039 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 07:16:46.195737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3617536508.mount: Deactivated successfully. May 13 07:16:46.203749 env[1159]: time="2025-05-13T07:16:46.203710280Z" level=info msg="CreateContainer within sandbox \"f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3\"" May 13 07:16:46.204511 env[1159]: time="2025-05-13T07:16:46.204488935Z" level=info msg="StartContainer for \"3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3\"" May 13 07:16:46.243659 systemd[1]: Started cri-containerd-3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3.scope. May 13 07:16:46.249361 systemd[1]: run-containerd-runc-k8s.io-3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3-runc.Q0dIKr.mount: Deactivated successfully. May 13 07:16:46.278565 kernel: kauditd_printk_skb: 179 callbacks suppressed May 13 07:16:46.278669 kernel: audit: type=1400 audit(1747120606.270:933): avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f09e4214908 items=0 ppid=2484 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:46.286454 kernel: audit: type=1300 audit(1747120606.270:933): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f09e4214908 items=0 ppid=2484 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:46.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623735356562363533333234313966306165393261363033316461 May 13 07:16:46.292837 kernel: audit: type=1327 audit(1747120606.270:933): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623735356562363533333234313966306165393261363033316461 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.303947 kernel: audit: type=1400 audit(1747120606.270:934): avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.304061 kernel: audit: type=1400 audit(1747120606.270:934): avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.308853 kernel: audit: type=1400 audit(1747120606.270:934): avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.318988 env[1159]: time="2025-05-13T07:16:46.318955406Z" level=info msg="StartContainer for \"3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3\" returns successfully" May 13 07:16:46.319279 kernel: audit: type=1400 audit(1747120606.270:934): avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.331743 kernel: audit: type=1400 audit(1747120606.270:934): avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.331799 kernel: audit: type=1400 audit(1747120606.270:934): avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.332285 systemd[1]: cri-containerd-3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3.scope: Deactivated successfully. May 13 07:16:46.336498 kernel: audit: type=1400 audit(1747120606.270:934): avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.270000 audit: BPF prog-id=130 op=LOAD May 13 07:16:46.270000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001f1fb8 items=0 ppid=2484 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:46.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623735356562363533333234313966306165393261363033316461 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit: BPF prog-id=131 op=LOAD May 13 07:16:46.277000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003ac008 items=0 ppid=2484 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:46.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623735356562363533333234313966306165393261363033316461 May 13 07:16:46.277000 audit: BPF prog-id=131 op=UNLOAD May 13 07:16:46.277000 audit: BPF prog-id=130 op=UNLOAD May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:46.277000 audit: BPF prog-id=132 op=LOAD May 13 07:16:46.277000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003ac098 items=0 ppid=2484 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:46.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623735356562363533333234313966306165393261363033316461 May 13 07:16:46.338000 audit: BPF prog-id=132 op=UNLOAD May 13 07:16:46.969691 env[1159]: time="2025-05-13T07:16:46.969583401Z" level=info msg="shim disconnected" id=3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3 May 13 07:16:46.970208 env[1159]: time="2025-05-13T07:16:46.970159101Z" level=warning msg="cleaning up after shim disconnected" id=3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3 namespace=k8s.io May 13 07:16:46.970494 env[1159]: time="2025-05-13T07:16:46.970453940Z" level=info msg="cleaning up dead shim" May 13 07:16:46.989032 env[1159]: time="2025-05-13T07:16:46.988865588Z" level=warning msg="cleanup warnings time=\"2025-05-13T07:16:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2699 runtime=io.containerd.runc.v2\n" May 13 07:16:47.067033 env[1159]: time="2025-05-13T07:16:47.066550417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 07:16:47.103391 kubelet[2039]: I0513 07:16:47.103289 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5ccf7f5d5-wn26j" podStartSLOduration=4.457800584 podStartE2EDuration="8.103233847s" podCreationTimestamp="2025-05-13 07:16:39 +0000 UTC" firstStartedPulling="2025-05-13 07:16:40.293297592 +0000 UTC m=+21.660533047" lastFinishedPulling="2025-05-13 07:16:43.938730855 +0000 UTC m=+25.305966310" observedRunningTime="2025-05-13 07:16:45.08499554 +0000 UTC m=+26.452231046" watchObservedRunningTime="2025-05-13 07:16:47.103233847 +0000 UTC m=+28.470469382" May 13 07:16:47.187621 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3fb755eb65332419f0ae92a6031daf0f3acbc46c62d20ba67ad1528ff8c47ac3-rootfs.mount: Deactivated successfully. May 13 07:16:47.903593 kubelet[2039]: E0513 07:16:47.903491 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:49.903990 kubelet[2039]: E0513 07:16:49.903946 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:51.904285 kubelet[2039]: E0513 07:16:51.904172 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:53.903524 kubelet[2039]: E0513 07:16:53.903422 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:54.503570 env[1159]: time="2025-05-13T07:16:54.503484083Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:54.506538 env[1159]: time="2025-05-13T07:16:54.506478987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:54.508922 env[1159]: time="2025-05-13T07:16:54.508861412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:54.511272 env[1159]: time="2025-05-13T07:16:54.511174066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:16:54.512497 env[1159]: time="2025-05-13T07:16:54.512453103Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 07:16:54.520403 env[1159]: time="2025-05-13T07:16:54.520326653Z" level=info msg="CreateContainer within sandbox \"f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 07:16:54.540573 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2716912489.mount: Deactivated successfully. May 13 07:16:54.558795 env[1159]: time="2025-05-13T07:16:54.558700599Z" level=info msg="CreateContainer within sandbox \"f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073\"" May 13 07:16:54.559793 env[1159]: time="2025-05-13T07:16:54.559765262Z" level=info msg="StartContainer for \"b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073\"" May 13 07:16:54.610209 systemd[1]: Started cri-containerd-b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073.scope. May 13 07:16:54.625000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.627764 kernel: kauditd_printk_skb: 34 callbacks suppressed May 13 07:16:54.627829 kernel: audit: type=1400 audit(1747120614.625:940): avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.632318 kernel: audit: type=1300 audit(1747120614.625:940): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd5bc488f88 items=0 ppid=2484 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:54.625000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd5bc488f88 items=0 ppid=2484 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:54.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613839323062613330363634336232356365376136353830393564 May 13 07:16:54.645838 kernel: audit: type=1327 audit(1747120614.625:940): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613839323062613330363634336232356365376136353830393564 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.650550 kernel: audit: type=1400 audit(1747120614.626:941): avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.650754 kernel: audit: type=1400 audit(1747120614.626:941): avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.660477 kernel: audit: type=1400 audit(1747120614.626:941): avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.671851 kernel: audit: type=1400 audit(1747120614.626:941): avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.671916 kernel: audit: type=1400 audit(1747120614.626:941): avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.683040 kernel: audit: type=1400 audit(1747120614.626:941): avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.683146 kernel: audit: type=1400 audit(1747120614.626:941): avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.626000 audit: BPF prog-id=133 op=LOAD May 13 07:16:54.626000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00037e568 items=0 ppid=2484 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:54.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613839323062613330363634336232356365376136353830393564 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit: BPF prog-id=134 op=LOAD May 13 07:16:54.639000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00037e5b8 items=0 ppid=2484 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:54.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613839323062613330363634336232356365376136353830393564 May 13 07:16:54.639000 audit: BPF prog-id=134 op=UNLOAD May 13 07:16:54.639000 audit: BPF prog-id=133 op=UNLOAD May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:16:54.639000 audit: BPF prog-id=135 op=LOAD May 13 07:16:54.639000 audit[2723]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00037e648 items=0 ppid=2484 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:54.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238613839323062613330363634336232356365376136353830393564 May 13 07:16:54.687480 env[1159]: time="2025-05-13T07:16:54.687418367Z" level=info msg="StartContainer for \"b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073\" returns successfully" May 13 07:16:55.540685 systemd[1]: run-containerd-runc-k8s.io-b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073-runc.OROGdN.mount: Deactivated successfully. May 13 07:16:55.910600 kubelet[2039]: E0513 07:16:55.910498 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:55.985631 env[1159]: time="2025-05-13T07:16:55.985543564Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 07:16:55.988223 systemd[1]: cri-containerd-b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073.scope: Deactivated successfully. May 13 07:16:55.993000 audit: BPF prog-id=135 op=UNLOAD May 13 07:16:56.017864 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073-rootfs.mount: Deactivated successfully. May 13 07:16:56.055969 kubelet[2039]: I0513 07:16:56.055931 2039 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 13 07:16:56.604001 kubelet[2039]: I0513 07:16:56.603937 2039 topology_manager.go:215] "Topology Admit Handler" podUID="3a0bab71-b899-49d4-9090-1fee903ee3ca" podNamespace="kube-system" podName="coredns-7db6d8ff4d-7gcqr" May 13 07:16:56.611731 kubelet[2039]: I0513 07:16:56.611684 2039 topology_manager.go:215] "Topology Admit Handler" podUID="73598660-7840-43c4-995c-6743bc978bfe" podNamespace="kube-system" podName="coredns-7db6d8ff4d-8fqxr" May 13 07:16:56.617436 kubelet[2039]: I0513 07:16:56.617388 2039 topology_manager.go:215] "Topology Admit Handler" podUID="ed427429-a83c-40b7-b584-f943deea24bc" podNamespace="calico-system" podName="calico-kube-controllers-85bff8447f-wgtt6" May 13 07:16:56.619203 systemd[1]: Created slice kubepods-burstable-pod3a0bab71_b899_49d4_9090_1fee903ee3ca.slice. May 13 07:16:56.628179 kubelet[2039]: I0513 07:16:56.628119 2039 topology_manager.go:215] "Topology Admit Handler" podUID="1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d" podNamespace="calico-apiserver" podName="calico-apiserver-c7964b5fc-8ngvg" May 13 07:16:56.639510 systemd[1]: Created slice kubepods-burstable-pod73598660_7840_43c4_995c_6743bc978bfe.slice. May 13 07:16:56.658047 systemd[1]: Created slice kubepods-besteffort-poded427429_a83c_40b7_b584_f943deea24bc.slice. May 13 07:16:56.665646 kubelet[2039]: I0513 07:16:56.665581 2039 topology_manager.go:215] "Topology Admit Handler" podUID="53ac7b8b-cefd-4053-8ae9-cd52eaed3172" podNamespace="calico-apiserver" podName="calico-apiserver-c7964b5fc-gmfjr" May 13 07:16:56.673648 systemd[1]: Created slice kubepods-besteffort-pod1da3d6dd_5b59_49e0_86e9_ebe39f8dc17d.slice. May 13 07:16:56.681419 systemd[1]: Created slice kubepods-besteffort-pod53ac7b8b_cefd_4053_8ae9_cd52eaed3172.slice. May 13 07:16:56.756423 kubelet[2039]: I0513 07:16:56.756230 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ed427429-a83c-40b7-b584-f943deea24bc-tigera-ca-bundle\") pod \"calico-kube-controllers-85bff8447f-wgtt6\" (UID: \"ed427429-a83c-40b7-b584-f943deea24bc\") " pod="calico-system/calico-kube-controllers-85bff8447f-wgtt6" May 13 07:16:56.756993 kubelet[2039]: I0513 07:16:56.756919 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wprnt\" (UniqueName: \"kubernetes.io/projected/3a0bab71-b899-49d4-9090-1fee903ee3ca-kube-api-access-wprnt\") pod \"coredns-7db6d8ff4d-7gcqr\" (UID: \"3a0bab71-b899-49d4-9090-1fee903ee3ca\") " pod="kube-system/coredns-7db6d8ff4d-7gcqr" May 13 07:16:56.757395 kubelet[2039]: I0513 07:16:56.757354 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l2tvp\" (UniqueName: \"kubernetes.io/projected/1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d-kube-api-access-l2tvp\") pod \"calico-apiserver-c7964b5fc-8ngvg\" (UID: \"1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d\") " pod="calico-apiserver/calico-apiserver-c7964b5fc-8ngvg" May 13 07:16:56.757813 kubelet[2039]: I0513 07:16:56.757740 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3a0bab71-b899-49d4-9090-1fee903ee3ca-config-volume\") pod \"coredns-7db6d8ff4d-7gcqr\" (UID: \"3a0bab71-b899-49d4-9090-1fee903ee3ca\") " pod="kube-system/coredns-7db6d8ff4d-7gcqr" May 13 07:16:56.758184 kubelet[2039]: I0513 07:16:56.758118 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/73598660-7840-43c4-995c-6743bc978bfe-config-volume\") pod \"coredns-7db6d8ff4d-8fqxr\" (UID: \"73598660-7840-43c4-995c-6743bc978bfe\") " pod="kube-system/coredns-7db6d8ff4d-8fqxr" May 13 07:16:56.758548 kubelet[2039]: I0513 07:16:56.758484 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-74qv6\" (UniqueName: \"kubernetes.io/projected/53ac7b8b-cefd-4053-8ae9-cd52eaed3172-kube-api-access-74qv6\") pod \"calico-apiserver-c7964b5fc-gmfjr\" (UID: \"53ac7b8b-cefd-4053-8ae9-cd52eaed3172\") " pod="calico-apiserver/calico-apiserver-c7964b5fc-gmfjr" May 13 07:16:56.758925 kubelet[2039]: I0513 07:16:56.758852 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4ftvf\" (UniqueName: \"kubernetes.io/projected/73598660-7840-43c4-995c-6743bc978bfe-kube-api-access-4ftvf\") pod \"coredns-7db6d8ff4d-8fqxr\" (UID: \"73598660-7840-43c4-995c-6743bc978bfe\") " pod="kube-system/coredns-7db6d8ff4d-8fqxr" May 13 07:16:56.759296 kubelet[2039]: I0513 07:16:56.759207 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t84mj\" (UniqueName: \"kubernetes.io/projected/ed427429-a83c-40b7-b584-f943deea24bc-kube-api-access-t84mj\") pod \"calico-kube-controllers-85bff8447f-wgtt6\" (UID: \"ed427429-a83c-40b7-b584-f943deea24bc\") " pod="calico-system/calico-kube-controllers-85bff8447f-wgtt6" May 13 07:16:56.759743 kubelet[2039]: I0513 07:16:56.759704 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/53ac7b8b-cefd-4053-8ae9-cd52eaed3172-calico-apiserver-certs\") pod \"calico-apiserver-c7964b5fc-gmfjr\" (UID: \"53ac7b8b-cefd-4053-8ae9-cd52eaed3172\") " pod="calico-apiserver/calico-apiserver-c7964b5fc-gmfjr" May 13 07:16:56.760113 kubelet[2039]: I0513 07:16:56.760050 2039 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d-calico-apiserver-certs\") pod \"calico-apiserver-c7964b5fc-8ngvg\" (UID: \"1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d\") " pod="calico-apiserver/calico-apiserver-c7964b5fc-8ngvg" May 13 07:16:56.801272 env[1159]: time="2025-05-13T07:16:56.800780037Z" level=info msg="shim disconnected" id=b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073 May 13 07:16:56.801272 env[1159]: time="2025-05-13T07:16:56.800852755Z" level=warning msg="cleaning up after shim disconnected" id=b8a8920ba306643b25ce7a658095d36116f8f56b9e3feba4494a9a0ba8817073 namespace=k8s.io May 13 07:16:56.801272 env[1159]: time="2025-05-13T07:16:56.800865609Z" level=info msg="cleaning up dead shim" May 13 07:16:56.824456 env[1159]: time="2025-05-13T07:16:56.824410704Z" level=warning msg="cleanup warnings time=\"2025-05-13T07:16:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2764 runtime=io.containerd.runc.v2\ntime=\"2025-05-13T07:16:56Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" May 13 07:16:56.930463 env[1159]: time="2025-05-13T07:16:56.930064140Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7gcqr,Uid:3a0bab71-b899-49d4-9090-1fee903ee3ca,Namespace:kube-system,Attempt:0,}" May 13 07:16:56.948473 env[1159]: time="2025-05-13T07:16:56.948433161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8fqxr,Uid:73598660-7840-43c4-995c-6743bc978bfe,Namespace:kube-system,Attempt:0,}" May 13 07:16:56.981512 env[1159]: time="2025-05-13T07:16:56.981467262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c7964b5fc-8ngvg,Uid:1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d,Namespace:calico-apiserver,Attempt:0,}" May 13 07:16:56.988422 env[1159]: time="2025-05-13T07:16:56.988371151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c7964b5fc-gmfjr,Uid:53ac7b8b-cefd-4053-8ae9-cd52eaed3172,Namespace:calico-apiserver,Attempt:0,}" May 13 07:16:56.989019 env[1159]: time="2025-05-13T07:16:56.988980062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85bff8447f-wgtt6,Uid:ed427429-a83c-40b7-b584-f943deea24bc,Namespace:calico-system,Attempt:0,}" May 13 07:16:57.099565 env[1159]: time="2025-05-13T07:16:57.099499628Z" level=error msg="Failed to destroy network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.100079 env[1159]: time="2025-05-13T07:16:57.100048725Z" level=error msg="encountered an error cleaning up failed sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.100190 env[1159]: time="2025-05-13T07:16:57.100161258Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7gcqr,Uid:3a0bab71-b899-49d4-9090-1fee903ee3ca,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.100496 kubelet[2039]: E0513 07:16:57.100449 2039 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.101912 kubelet[2039]: E0513 07:16:57.100519 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7gcqr" May 13 07:16:57.101912 kubelet[2039]: E0513 07:16:57.100543 2039 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7gcqr" May 13 07:16:57.101912 kubelet[2039]: E0513 07:16:57.100586 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-7gcqr_kube-system(3a0bab71-b899-49d4-9090-1fee903ee3ca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-7gcqr_kube-system(3a0bab71-b899-49d4-9090-1fee903ee3ca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7gcqr" podUID="3a0bab71-b899-49d4-9090-1fee903ee3ca" May 13 07:16:57.105758 env[1159]: time="2025-05-13T07:16:57.105726034Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 07:16:57.148374 env[1159]: time="2025-05-13T07:16:57.148324005Z" level=error msg="Failed to destroy network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.148855 env[1159]: time="2025-05-13T07:16:57.148789946Z" level=error msg="encountered an error cleaning up failed sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.148996 env[1159]: time="2025-05-13T07:16:57.148959547Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8fqxr,Uid:73598660-7840-43c4-995c-6743bc978bfe,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.149467 kubelet[2039]: E0513 07:16:57.149323 2039 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.149467 kubelet[2039]: E0513 07:16:57.149444 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-8fqxr" May 13 07:16:57.149569 kubelet[2039]: E0513 07:16:57.149467 2039 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-8fqxr" May 13 07:16:57.149569 kubelet[2039]: E0513 07:16:57.149505 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-8fqxr_kube-system(73598660-7840-43c4-995c-6743bc978bfe)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-8fqxr_kube-system(73598660-7840-43c4-995c-6743bc978bfe)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-8fqxr" podUID="73598660-7840-43c4-995c-6743bc978bfe" May 13 07:16:57.180393 env[1159]: time="2025-05-13T07:16:57.180339819Z" level=error msg="Failed to destroy network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.180977 env[1159]: time="2025-05-13T07:16:57.180880642Z" level=error msg="encountered an error cleaning up failed sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.181104 env[1159]: time="2025-05-13T07:16:57.181073146Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c7964b5fc-8ngvg,Uid:1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.182271 kubelet[2039]: E0513 07:16:57.181913 2039 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.182271 kubelet[2039]: E0513 07:16:57.181971 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c7964b5fc-8ngvg" May 13 07:16:57.182271 kubelet[2039]: E0513 07:16:57.181994 2039 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c7964b5fc-8ngvg" May 13 07:16:57.183529 kubelet[2039]: E0513 07:16:57.182042 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-c7964b5fc-8ngvg_calico-apiserver(1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-c7964b5fc-8ngvg_calico-apiserver(1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c7964b5fc-8ngvg" podUID="1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d" May 13 07:16:57.193346 env[1159]: time="2025-05-13T07:16:57.193218267Z" level=error msg="Failed to destroy network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.193691 env[1159]: time="2025-05-13T07:16:57.193639153Z" level=error msg="encountered an error cleaning up failed sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.193742 env[1159]: time="2025-05-13T07:16:57.193705288Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c7964b5fc-gmfjr,Uid:53ac7b8b-cefd-4053-8ae9-cd52eaed3172,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.193979 kubelet[2039]: E0513 07:16:57.193925 2039 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.194043 kubelet[2039]: E0513 07:16:57.193997 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c7964b5fc-gmfjr" May 13 07:16:57.194043 kubelet[2039]: E0513 07:16:57.194035 2039 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c7964b5fc-gmfjr" May 13 07:16:57.194128 kubelet[2039]: E0513 07:16:57.194080 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-c7964b5fc-gmfjr_calico-apiserver(53ac7b8b-cefd-4053-8ae9-cd52eaed3172)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-c7964b5fc-gmfjr_calico-apiserver(53ac7b8b-cefd-4053-8ae9-cd52eaed3172)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c7964b5fc-gmfjr" podUID="53ac7b8b-cefd-4053-8ae9-cd52eaed3172" May 13 07:16:57.212668 env[1159]: time="2025-05-13T07:16:57.212609353Z" level=error msg="Failed to destroy network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.213045 env[1159]: time="2025-05-13T07:16:57.212996464Z" level=error msg="encountered an error cleaning up failed sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.213133 env[1159]: time="2025-05-13T07:16:57.213057569Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85bff8447f-wgtt6,Uid:ed427429-a83c-40b7-b584-f943deea24bc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.213354 kubelet[2039]: E0513 07:16:57.213305 2039 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:57.213449 kubelet[2039]: E0513 07:16:57.213385 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85bff8447f-wgtt6" May 13 07:16:57.213449 kubelet[2039]: E0513 07:16:57.213410 2039 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85bff8447f-wgtt6" May 13 07:16:57.213528 kubelet[2039]: E0513 07:16:57.213477 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-85bff8447f-wgtt6_calico-system(ed427429-a83c-40b7-b584-f943deea24bc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-85bff8447f-wgtt6_calico-system(ed427429-a83c-40b7-b584-f943deea24bc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85bff8447f-wgtt6" podUID="ed427429-a83c-40b7-b584-f943deea24bc" May 13 07:16:57.914703 systemd[1]: Created slice kubepods-besteffort-pod86f7d333_22c4_4d19_b6ba_f4cf43ce1598.slice. May 13 07:16:57.920678 env[1159]: time="2025-05-13T07:16:57.920583275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ncrlc,Uid:86f7d333-22c4-4d19-b6ba-f4cf43ce1598,Namespace:calico-system,Attempt:0,}" May 13 07:16:58.039019 env[1159]: time="2025-05-13T07:16:58.038968545Z" level=error msg="Failed to destroy network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.043439 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d-shm.mount: Deactivated successfully. May 13 07:16:58.045004 env[1159]: time="2025-05-13T07:16:58.044963713Z" level=error msg="encountered an error cleaning up failed sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.045144 env[1159]: time="2025-05-13T07:16:58.045111392Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ncrlc,Uid:86f7d333-22c4-4d19-b6ba-f4cf43ce1598,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.045491 kubelet[2039]: E0513 07:16:58.045444 2039 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.045562 kubelet[2039]: E0513 07:16:58.045501 2039 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ncrlc" May 13 07:16:58.045562 kubelet[2039]: E0513 07:16:58.045529 2039 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ncrlc" May 13 07:16:58.045628 kubelet[2039]: E0513 07:16:58.045569 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ncrlc_calico-system(86f7d333-22c4-4d19-b6ba-f4cf43ce1598)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ncrlc_calico-system(86f7d333-22c4-4d19-b6ba-f4cf43ce1598)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:58.109034 kubelet[2039]: I0513 07:16:58.108376 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:16:58.111009 env[1159]: time="2025-05-13T07:16:58.110958866Z" level=info msg="StopPodSandbox for \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\"" May 13 07:16:58.111686 kubelet[2039]: I0513 07:16:58.111646 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:16:58.113426 env[1159]: time="2025-05-13T07:16:58.113355684Z" level=info msg="StopPodSandbox for \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\"" May 13 07:16:58.116491 kubelet[2039]: I0513 07:16:58.116409 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:16:58.117312 env[1159]: time="2025-05-13T07:16:58.117161645Z" level=info msg="StopPodSandbox for \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\"" May 13 07:16:58.121050 kubelet[2039]: I0513 07:16:58.120927 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:16:58.121883 env[1159]: time="2025-05-13T07:16:58.121754062Z" level=info msg="StopPodSandbox for \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\"" May 13 07:16:58.129094 kubelet[2039]: I0513 07:16:58.129050 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:16:58.130595 env[1159]: time="2025-05-13T07:16:58.130536416Z" level=info msg="StopPodSandbox for \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\"" May 13 07:16:58.133091 kubelet[2039]: I0513 07:16:58.133062 2039 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:16:58.133939 env[1159]: time="2025-05-13T07:16:58.133889721Z" level=info msg="StopPodSandbox for \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\"" May 13 07:16:58.228478 env[1159]: time="2025-05-13T07:16:58.227711110Z" level=error msg="StopPodSandbox for \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\" failed" error="failed to destroy network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.228723 kubelet[2039]: E0513 07:16:58.227967 2039 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:16:58.228723 kubelet[2039]: E0513 07:16:58.228348 2039 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785"} May 13 07:16:58.228723 kubelet[2039]: E0513 07:16:58.228616 2039 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"73598660-7840-43c4-995c-6743bc978bfe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 07:16:58.228723 kubelet[2039]: E0513 07:16:58.228649 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"73598660-7840-43c4-995c-6743bc978bfe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-8fqxr" podUID="73598660-7840-43c4-995c-6743bc978bfe" May 13 07:16:58.241098 env[1159]: time="2025-05-13T07:16:58.240281832Z" level=error msg="StopPodSandbox for \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\" failed" error="failed to destroy network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.241591 kubelet[2039]: E0513 07:16:58.241408 2039 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:16:58.241591 kubelet[2039]: E0513 07:16:58.241475 2039 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567"} May 13 07:16:58.241591 kubelet[2039]: E0513 07:16:58.241517 2039 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed427429-a83c-40b7-b584-f943deea24bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 07:16:58.241591 kubelet[2039]: E0513 07:16:58.241562 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed427429-a83c-40b7-b584-f943deea24bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85bff8447f-wgtt6" podUID="ed427429-a83c-40b7-b584-f943deea24bc" May 13 07:16:58.267164 env[1159]: time="2025-05-13T07:16:58.267089623Z" level=error msg="StopPodSandbox for \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\" failed" error="failed to destroy network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.267820 kubelet[2039]: E0513 07:16:58.267643 2039 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:16:58.267820 kubelet[2039]: E0513 07:16:58.267695 2039 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0"} May 13 07:16:58.267820 kubelet[2039]: E0513 07:16:58.267750 2039 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 07:16:58.267820 kubelet[2039]: E0513 07:16:58.267775 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c7964b5fc-8ngvg" podUID="1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d" May 13 07:16:58.286077 env[1159]: time="2025-05-13T07:16:58.286024619Z" level=error msg="StopPodSandbox for \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\" failed" error="failed to destroy network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.286636 kubelet[2039]: E0513 07:16:58.286453 2039 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:16:58.286636 kubelet[2039]: E0513 07:16:58.286517 2039 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725"} May 13 07:16:58.286636 kubelet[2039]: E0513 07:16:58.286553 2039 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3a0bab71-b899-49d4-9090-1fee903ee3ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 07:16:58.286636 kubelet[2039]: E0513 07:16:58.286608 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3a0bab71-b899-49d4-9090-1fee903ee3ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7gcqr" podUID="3a0bab71-b899-49d4-9090-1fee903ee3ca" May 13 07:16:58.287914 env[1159]: time="2025-05-13T07:16:58.287856391Z" level=error msg="StopPodSandbox for \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\" failed" error="failed to destroy network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.288179 kubelet[2039]: E0513 07:16:58.288039 2039 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:16:58.288179 kubelet[2039]: E0513 07:16:58.288091 2039 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1"} May 13 07:16:58.288179 kubelet[2039]: E0513 07:16:58.288120 2039 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"53ac7b8b-cefd-4053-8ae9-cd52eaed3172\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 07:16:58.288179 kubelet[2039]: E0513 07:16:58.288141 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"53ac7b8b-cefd-4053-8ae9-cd52eaed3172\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c7964b5fc-gmfjr" podUID="53ac7b8b-cefd-4053-8ae9-cd52eaed3172" May 13 07:16:58.291794 env[1159]: time="2025-05-13T07:16:58.291742884Z" level=error msg="StopPodSandbox for \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\" failed" error="failed to destroy network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 07:16:58.292068 kubelet[2039]: E0513 07:16:58.292018 2039 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:16:58.292126 kubelet[2039]: E0513 07:16:58.292066 2039 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d"} May 13 07:16:58.292126 kubelet[2039]: E0513 07:16:58.292100 2039 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"86f7d333-22c4-4d19-b6ba-f4cf43ce1598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 07:16:58.292212 kubelet[2039]: E0513 07:16:58.292127 2039 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"86f7d333-22c4-4d19-b6ba-f4cf43ce1598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ncrlc" podUID="86f7d333-22c4-4d19-b6ba-f4cf43ce1598" May 13 07:16:58.563317 kubelet[2039]: I0513 07:16:58.559986 2039 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 07:16:58.654000 audit[3095]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:58.654000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe803fa220 a2=0 a3=7ffe803fa20c items=0 ppid=2172 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:58.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:16:58.658000 audit[3095]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:16:58.658000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe803fa220 a2=0 a3=7ffe803fa20c items=0 ppid=2172 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:16:58.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:08.201815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3278137160.mount: Deactivated successfully. May 13 07:17:08.246302 env[1159]: time="2025-05-13T07:17:08.246225310Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:08.251097 env[1159]: time="2025-05-13T07:17:08.251071781Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:08.255852 env[1159]: time="2025-05-13T07:17:08.255828594Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:08.258790 env[1159]: time="2025-05-13T07:17:08.258721040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:08.259313 env[1159]: time="2025-05-13T07:17:08.259287328Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 07:17:08.288384 env[1159]: time="2025-05-13T07:17:08.288346871Z" level=info msg="CreateContainer within sandbox \"f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 07:17:08.311929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount345820141.mount: Deactivated successfully. May 13 07:17:08.321769 env[1159]: time="2025-05-13T07:17:08.321715491Z" level=info msg="CreateContainer within sandbox \"f6b57d614046962102494b165dc4c85926c357e030187c2874154cca9bce65ce\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7\"" May 13 07:17:08.323455 env[1159]: time="2025-05-13T07:17:08.323410629Z" level=info msg="StartContainer for \"ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7\"" May 13 07:17:08.358130 systemd[1]: Started cri-containerd-ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7.scope. May 13 07:17:08.387000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.390480 kernel: kauditd_printk_skb: 40 callbacks suppressed May 13 07:17:08.390534 kernel: audit: type=1400 audit(1747120628.387:949): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.387000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f503c1eeb18 items=0 ppid=2484 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:08.401961 kernel: audit: type=1300 audit(1747120628.387:949): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f503c1eeb18 items=0 ppid=2484 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:08.402047 kernel: audit: type=1327 audit(1747120628.387:949): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373733346165386431346632366566653135613339666532336432 May 13 07:17:08.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373733346165386431346632366566653135613339666532336432 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.417167 kernel: audit: type=1400 audit(1747120628.389:950): avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.417230 kernel: audit: type=1400 audit(1747120628.389:950): avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.417288 kernel: audit: type=1400 audit(1747120628.389:950): avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.421849 kernel: audit: type=1400 audit(1747120628.389:950): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.426639 kernel: audit: type=1400 audit(1747120628.389:950): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.440456 kernel: audit: type=1400 audit(1747120628.389:950): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.440548 kernel: audit: type=1400 audit(1747120628.389:950): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.389000 audit: BPF prog-id=136 op=LOAD May 13 07:17:08.389000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00030a888 items=0 ppid=2484 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:08.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373733346165386431346632366566653135613339666532336432 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.407000 audit: BPF prog-id=137 op=LOAD May 13 07:17:08.407000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00030a8d8 items=0 ppid=2484 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:08.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373733346165386431346632366566653135613339666532336432 May 13 07:17:08.411000 audit: BPF prog-id=137 op=UNLOAD May 13 07:17:08.411000 audit: BPF prog-id=136 op=UNLOAD May 13 07:17:08.411000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:08.411000 audit: BPF prog-id=138 op=LOAD May 13 07:17:08.411000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00030a968 items=0 ppid=2484 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:08.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373733346165386431346632366566653135613339666532336432 May 13 07:17:08.454572 env[1159]: time="2025-05-13T07:17:08.454496646Z" level=info msg="StartContainer for \"ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7\" returns successfully" May 13 07:17:08.544616 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 07:17:08.544735 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 07:17:08.907230 env[1159]: time="2025-05-13T07:17:08.907150031Z" level=info msg="StopPodSandbox for \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\"" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.029 [INFO][3179] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.029 [INFO][3179] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" iface="eth0" netns="/var/run/netns/cni-4da93996-8a23-ded7-de90-57a7ead7f6b4" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.030 [INFO][3179] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" iface="eth0" netns="/var/run/netns/cni-4da93996-8a23-ded7-de90-57a7ead7f6b4" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.030 [INFO][3179] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" iface="eth0" netns="/var/run/netns/cni-4da93996-8a23-ded7-de90-57a7ead7f6b4" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.031 [INFO][3179] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.031 [INFO][3179] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.084 [INFO][3186] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.085 [INFO][3186] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.085 [INFO][3186] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.096 [WARNING][3186] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.097 [INFO][3186] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.099 [INFO][3186] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:09.103023 env[1159]: 2025-05-13 07:17:09.101 [INFO][3179] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:09.103962 env[1159]: time="2025-05-13T07:17:09.103128513Z" level=info msg="TearDown network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\" successfully" May 13 07:17:09.103962 env[1159]: time="2025-05-13T07:17:09.103170302Z" level=info msg="StopPodSandbox for \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\" returns successfully" May 13 07:17:09.104519 env[1159]: time="2025-05-13T07:17:09.104460405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7gcqr,Uid:3a0bab71-b899-49d4-9090-1fee903ee3ca,Namespace:kube-system,Attempt:1,}" May 13 07:17:09.180729 kubelet[2039]: I0513 07:17:09.179698 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vxn9n" podStartSLOduration=2.394109085 podStartE2EDuration="30.179667212s" podCreationTimestamp="2025-05-13 07:16:39 +0000 UTC" firstStartedPulling="2025-05-13 07:16:40.475168344 +0000 UTC m=+21.842403810" lastFinishedPulling="2025-05-13 07:17:08.260726482 +0000 UTC m=+49.627961937" observedRunningTime="2025-05-13 07:17:09.176919961 +0000 UTC m=+50.544155436" watchObservedRunningTime="2025-05-13 07:17:09.179667212 +0000 UTC m=+50.546902667" May 13 07:17:09.203844 systemd[1]: run-netns-cni\x2d4da93996\x2d8a23\x2dded7\x2dde90\x2d57a7ead7f6b4.mount: Deactivated successfully. May 13 07:17:09.331421 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 07:17:09.331522 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid7addcda960: link becomes ready May 13 07:17:09.328846 systemd-networkd[987]: calid7addcda960: Link UP May 13 07:17:09.331598 systemd-networkd[987]: calid7addcda960: Gained carrier May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.190 [INFO][3194] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.214 [INFO][3194] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0 coredns-7db6d8ff4d- kube-system 3a0bab71-b899-49d4-9090-1fee903ee3ca 796 0 2025-05-13 07:16:32 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-1a4ba3031a.novalocal coredns-7db6d8ff4d-7gcqr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid7addcda960 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7gcqr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.214 [INFO][3194] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7gcqr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.260 [INFO][3226] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" HandleID="k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.270 [INFO][3226] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" HandleID="k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031bc60), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-1a4ba3031a.novalocal", "pod":"coredns-7db6d8ff4d-7gcqr", "timestamp":"2025-05-13 07:17:09.260518153 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1a4ba3031a.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.271 [INFO][3226] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.271 [INFO][3226] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.271 [INFO][3226] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1a4ba3031a.novalocal' May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.275 [INFO][3226] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.279 [INFO][3226] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.285 [INFO][3226] ipam/ipam.go 489: Trying affinity for 192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.287 [INFO][3226] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.289 [INFO][3226] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.289 [INFO][3226] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.291 [INFO][3226] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7 May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.299 [INFO][3226] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.306 [INFO][3226] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.1/26] block=192.168.113.0/26 handle="k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.306 [INFO][3226] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.1/26] handle="k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.306 [INFO][3226] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:09.370511 env[1159]: 2025-05-13 07:17:09.307 [INFO][3226] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.1/26] IPv6=[] ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" HandleID="k8s-pod-network.3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.371411 env[1159]: 2025-05-13 07:17:09.310 [INFO][3194] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7gcqr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"3a0bab71-b899-49d4-9090-1fee903ee3ca", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"", Pod:"coredns-7db6d8ff4d-7gcqr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid7addcda960", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:09.371411 env[1159]: 2025-05-13 07:17:09.310 [INFO][3194] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.1/32] ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7gcqr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.371411 env[1159]: 2025-05-13 07:17:09.310 [INFO][3194] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid7addcda960 ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7gcqr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.371411 env[1159]: 2025-05-13 07:17:09.332 [INFO][3194] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7gcqr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.371411 env[1159]: 2025-05-13 07:17:09.333 [INFO][3194] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7gcqr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"3a0bab71-b899-49d4-9090-1fee903ee3ca", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7", Pod:"coredns-7db6d8ff4d-7gcqr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid7addcda960", MAC:"b2:19:e8:1a:18:9a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:09.371411 env[1159]: 2025-05-13 07:17:09.369 [INFO][3194] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7gcqr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:09.484836 env[1159]: time="2025-05-13T07:17:09.484498630Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:17:09.484836 env[1159]: time="2025-05-13T07:17:09.484576718Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:17:09.484836 env[1159]: time="2025-05-13T07:17:09.484607766Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:17:09.485437 env[1159]: time="2025-05-13T07:17:09.484817251Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7 pid=3255 runtime=io.containerd.runc.v2 May 13 07:17:09.523643 systemd[1]: Started cri-containerd-3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7.scope. May 13 07:17:09.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.547000 audit: BPF prog-id=139 op=LOAD May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023dc48 a2=10 a3=1c items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386233303964313766313833623331653633386332393637303733 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00023d6b0 a2=3c a3=c items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386233303964313766313833623331653633386332393637303733 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit: BPF prog-id=140 op=LOAD May 13 07:17:09.548000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023d9d8 a2=78 a3=c0003c06e0 items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386233303964313766313833623331653633386332393637303733 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit: BPF prog-id=141 op=LOAD May 13 07:17:09.548000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00023d770 a2=78 a3=c0003c0728 items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386233303964313766313833623331653633386332393637303733 May 13 07:17:09.548000 audit: BPF prog-id=141 op=UNLOAD May 13 07:17:09.548000 audit: BPF prog-id=140 op=UNLOAD May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.548000 audit: BPF prog-id=142 op=LOAD May 13 07:17:09.548000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023dc30 a2=78 a3=c0003c0b38 items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386233303964313766313833623331653633386332393637303733 May 13 07:17:09.576625 env[1159]: time="2025-05-13T07:17:09.576562117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7gcqr,Uid:3a0bab71-b899-49d4-9090-1fee903ee3ca,Namespace:kube-system,Attempt:1,} returns sandbox id \"3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7\"" May 13 07:17:09.587315 env[1159]: time="2025-05-13T07:17:09.587273228Z" level=info msg="CreateContainer within sandbox \"3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 07:17:09.610310 env[1159]: time="2025-05-13T07:17:09.610275068Z" level=info msg="CreateContainer within sandbox \"3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6c5b7283bbfb0ee3c3800cb790893979b918a6a04f26bb7caaaaafcc0b5cc2cb\"" May 13 07:17:09.611000 env[1159]: time="2025-05-13T07:17:09.610977875Z" level=info msg="StartContainer for \"6c5b7283bbfb0ee3c3800cb790893979b918a6a04f26bb7caaaaafcc0b5cc2cb\"" May 13 07:17:09.627503 systemd[1]: Started cri-containerd-6c5b7283bbfb0ee3c3800cb790893979b918a6a04f26bb7caaaaafcc0b5cc2cb.scope. May 13 07:17:09.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.641000 audit: BPF prog-id=143 op=LOAD May 13 07:17:09.642000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3255 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356237323833626266623065653363333830306362373930383933 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3255 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356237323833626266623065653363333830306362373930383933 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.642000 audit: BPF prog-id=144 op=LOAD May 13 07:17:09.642000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1d40 items=0 ppid=3255 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356237323833626266623065653363333830306362373930383933 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.643000 audit: BPF prog-id=145 op=LOAD May 13 07:17:09.643000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d88 items=0 ppid=3255 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356237323833626266623065653363333830306362373930383933 May 13 07:17:09.644000 audit: BPF prog-id=145 op=UNLOAD May 13 07:17:09.644000 audit: BPF prog-id=144 op=UNLOAD May 13 07:17:09.644000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:09.644000 audit: BPF prog-id=146 op=LOAD May 13 07:17:09.644000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ba198 items=0 ppid=3255 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356237323833626266623065653363333830306362373930383933 May 13 07:17:09.662978 env[1159]: time="2025-05-13T07:17:09.662923041Z" level=info msg="StartContainer for \"6c5b7283bbfb0ee3c3800cb790893979b918a6a04f26bb7caaaaafcc0b5cc2cb\" returns successfully" May 13 07:17:09.921703 env[1159]: time="2025-05-13T07:17:09.921651110Z" level=info msg="StopPodSandbox for \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\"" May 13 07:17:09.935000 audit[3365]: AVC avc: denied { write } for pid=3365 comm="tee" name="fd" dev="proc" ino=26280 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 07:17:09.935000 audit[3365]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe991d69fa a2=241 a3=1b6 items=1 ppid=3335 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.935000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 07:17:09.935000 audit: PATH item=0 name="/dev/fd/63" inode=27142 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:17:09.935000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 07:17:09.944000 audit[3398]: AVC avc: denied { write } for pid=3398 comm="tee" name="fd" dev="proc" ino=26295 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 07:17:09.944000 audit[3398]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8716c9e9 a2=241 a3=1b6 items=1 ppid=3339 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.944000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 07:17:09.944000 audit: PATH item=0 name="/dev/fd/63" inode=26292 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:17:09.944000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 07:17:09.944000 audit[3395]: AVC avc: denied { write } for pid=3395 comm="tee" name="fd" dev="proc" ino=26299 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 07:17:09.944000 audit[3395]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc073b09f9 a2=241 a3=1b6 items=1 ppid=3341 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.944000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 07:17:09.944000 audit: PATH item=0 name="/dev/fd/63" inode=26282 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:17:09.944000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 07:17:09.990000 audit[3387]: AVC avc: denied { write } for pid=3387 comm="tee" name="fd" dev="proc" ino=26311 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 07:17:09.990000 audit[3387]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff775179f8 a2=241 a3=1b6 items=1 ppid=3334 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:09.990000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 07:17:09.990000 audit: PATH item=0 name="/dev/fd/63" inode=27150 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:17:09.990000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 07:17:10.028000 audit[3416]: AVC avc: denied { write } for pid=3416 comm="tee" name="fd" dev="proc" ino=26325 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 07:17:10.028000 audit[3416]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcdc8a79f8 a2=241 a3=1b6 items=1 ppid=3332 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.028000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 07:17:10.028000 audit: PATH item=0 name="/dev/fd/63" inode=27165 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:17:10.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 07:17:10.036000 audit[3418]: AVC avc: denied { write } for pid=3418 comm="tee" name="fd" dev="proc" ino=27177 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 07:17:10.036000 audit[3418]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5d5df9e8 a2=241 a3=1b6 items=1 ppid=3337 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.036000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 07:17:10.036000 audit: PATH item=0 name="/dev/fd/63" inode=27166 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:17:10.036000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 07:17:10.100000 audit[3434]: AVC avc: denied { write } for pid=3434 comm="tee" name="fd" dev="proc" ino=26352 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 07:17:10.100000 audit[3434]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6f8649f8 a2=241 a3=1b6 items=1 ppid=3357 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.100000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 07:17:10.100000 audit: PATH item=0 name="/dev/fd/63" inode=27178 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 07:17:10.100000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.020 [INFO][3388] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.020 [INFO][3388] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" iface="eth0" netns="/var/run/netns/cni-13c83d51-9c23-be72-4b55-04401aa3882b" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.020 [INFO][3388] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" iface="eth0" netns="/var/run/netns/cni-13c83d51-9c23-be72-4b55-04401aa3882b" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.021 [INFO][3388] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" iface="eth0" netns="/var/run/netns/cni-13c83d51-9c23-be72-4b55-04401aa3882b" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.021 [INFO][3388] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.021 [INFO][3388] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.086 [INFO][3427] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.087 [INFO][3427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.087 [INFO][3427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.101 [WARNING][3427] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.101 [INFO][3427] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.103 [INFO][3427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:10.105713 env[1159]: 2025-05-13 07:17:10.104 [INFO][3388] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:10.106148 env[1159]: time="2025-05-13T07:17:10.105836939Z" level=info msg="TearDown network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\" successfully" May 13 07:17:10.106148 env[1159]: time="2025-05-13T07:17:10.105870443Z" level=info msg="StopPodSandbox for \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\" returns successfully" May 13 07:17:10.106582 env[1159]: time="2025-05-13T07:17:10.106553000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ncrlc,Uid:86f7d333-22c4-4d19-b6ba-f4cf43ce1598,Namespace:calico-system,Attempt:1,}" May 13 07:17:10.204094 systemd[1]: run-netns-cni\x2d13c83d51\x2d9c23\x2dbe72\x2d4b55\x2d04401aa3882b.mount: Deactivated successfully. May 13 07:17:10.236000 audit[3478]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:10.236000 audit[3478]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd640fc790 a2=0 a3=7ffd640fc77c items=0 ppid=2172 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:10.247305 kubelet[2039]: I0513 07:17:10.247131 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-7gcqr" podStartSLOduration=38.246234527 podStartE2EDuration="38.246234527s" podCreationTimestamp="2025-05-13 07:16:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 07:17:10.195309106 +0000 UTC m=+51.562544591" watchObservedRunningTime="2025-05-13 07:17:10.246234527 +0000 UTC m=+51.613469982" May 13 07:17:10.252000 audit[3478]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:10.252000 audit[3478]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd640fc790 a2=0 a3=0 items=0 ppid=2172 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:10.276000 audit[3485]: NETFILTER_CFG table=filter:99 family=2 entries=13 op=nft_register_rule pid=3485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:10.276000 audit[3485]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff5184c910 a2=0 a3=7fff5184c8fc items=0 ppid=2172 pid=3485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:10.283000 audit[3485]: NETFILTER_CFG table=nat:100 family=2 entries=35 op=nft_register_chain pid=3485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:10.283000 audit[3485]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff5184c910 a2=0 a3=7fff5184c8fc items=0 ppid=2172 pid=3485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.322000 audit: BPF prog-id=147 op=LOAD May 13 07:17:10.322000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd4172d70 a2=98 a3=3 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.322000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.325000 audit: BPF prog-id=147 op=UNLOAD May 13 07:17:10.325000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit: BPF prog-id=148 op=LOAD May 13 07:17:10.325000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd4172b50 a2=74 a3=540051 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.325000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.325000 audit: BPF prog-id=148 op=UNLOAD May 13 07:17:10.325000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.325000 audit: BPF prog-id=149 op=LOAD May 13 07:17:10.325000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd4172b80 a2=94 a3=2 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.325000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.326000 audit: BPF prog-id=149 op=UNLOAD May 13 07:17:10.343097 systemd-networkd[987]: calif391510a370: Link UP May 13 07:17:10.346821 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif391510a370: link becomes ready May 13 07:17:10.347002 systemd-networkd[987]: calif391510a370: Gained carrier May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.195 [INFO][3439] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0 csi-node-driver- calico-system 86f7d333-22c4-4d19-b6ba-f4cf43ce1598 809 0 2025-05-13 07:16:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-n-1a4ba3031a.novalocal csi-node-driver-ncrlc eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calif391510a370 [] []}} ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Namespace="calico-system" Pod="csi-node-driver-ncrlc" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.196 [INFO][3439] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Namespace="calico-system" Pod="csi-node-driver-ncrlc" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.282 [INFO][3467] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" HandleID="k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.297 [INFO][3467] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" HandleID="k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313410), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-1a4ba3031a.novalocal", "pod":"csi-node-driver-ncrlc", "timestamp":"2025-05-13 07:17:10.282882724 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1a4ba3031a.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.297 [INFO][3467] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.297 [INFO][3467] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.297 [INFO][3467] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1a4ba3031a.novalocal' May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.299 [INFO][3467] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.305 [INFO][3467] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.314 [INFO][3467] ipam/ipam.go 489: Trying affinity for 192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.317 [INFO][3467] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.321 [INFO][3467] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.321 [INFO][3467] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.324 [INFO][3467] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113 May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.331 [INFO][3467] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.339 [INFO][3467] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.2/26] block=192.168.113.0/26 handle="k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.339 [INFO][3467] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.2/26] handle="k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.339 [INFO][3467] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:10.374876 env[1159]: 2025-05-13 07:17:10.339 [INFO][3467] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.2/26] IPv6=[] ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" HandleID="k8s-pod-network.755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.375745 env[1159]: 2025-05-13 07:17:10.341 [INFO][3439] cni-plugin/k8s.go 386: Populated endpoint ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Namespace="calico-system" Pod="csi-node-driver-ncrlc" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"86f7d333-22c4-4d19-b6ba-f4cf43ce1598", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"", Pod:"csi-node-driver-ncrlc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif391510a370", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:10.375745 env[1159]: 2025-05-13 07:17:10.341 [INFO][3439] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.2/32] ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Namespace="calico-system" Pod="csi-node-driver-ncrlc" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.375745 env[1159]: 2025-05-13 07:17:10.341 [INFO][3439] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif391510a370 ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Namespace="calico-system" Pod="csi-node-driver-ncrlc" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.375745 env[1159]: 2025-05-13 07:17:10.343 [INFO][3439] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Namespace="calico-system" Pod="csi-node-driver-ncrlc" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.375745 env[1159]: 2025-05-13 07:17:10.347 [INFO][3439] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Namespace="calico-system" Pod="csi-node-driver-ncrlc" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"86f7d333-22c4-4d19-b6ba-f4cf43ce1598", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113", Pod:"csi-node-driver-ncrlc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif391510a370", MAC:"32:1c:90:68:d4:92", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:10.375745 env[1159]: 2025-05-13 07:17:10.373 [INFO][3439] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113" Namespace="calico-system" Pod="csi-node-driver-ncrlc" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:10.390764 env[1159]: time="2025-05-13T07:17:10.390711265Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:17:10.390952 env[1159]: time="2025-05-13T07:17:10.390928014Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:17:10.391043 env[1159]: time="2025-05-13T07:17:10.391020628Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:17:10.391330 env[1159]: time="2025-05-13T07:17:10.391226276Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113 pid=3526 runtime=io.containerd.runc.v2 May 13 07:17:10.415810 systemd[1]: Started cri-containerd-755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113.scope. May 13 07:17:10.433840 systemd[1]: run-containerd-runc-k8s.io-755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113-runc.xgZwBE.mount: Deactivated successfully. May 13 07:17:10.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.461000 audit: BPF prog-id=150 op=LOAD May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3526 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735356438366639343133616239303863353630326261323933646365 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3526 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735356438366639343133616239303863353630326261323933646365 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit: BPF prog-id=151 op=LOAD May 13 07:17:10.464000 audit[3535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000278880 items=0 ppid=3526 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735356438366639343133616239303863353630326261323933646365 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.464000 audit: BPF prog-id=152 op=LOAD May 13 07:17:10.464000 audit[3535]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002788c8 items=0 ppid=3526 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735356438366639343133616239303863353630326261323933646365 May 13 07:17:10.465000 audit: BPF prog-id=152 op=UNLOAD May 13 07:17:10.465000 audit: BPF prog-id=151 op=UNLOAD May 13 07:17:10.465000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { perfmon } for pid=3535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit[3535]: AVC avc: denied { bpf } for pid=3535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.465000 audit: BPF prog-id=153 op=LOAD May 13 07:17:10.465000 audit[3535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000278cd8 items=0 ppid=3526 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735356438366639343133616239303863353630326261323933646365 May 13 07:17:10.494073 env[1159]: time="2025-05-13T07:17:10.494021938Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ncrlc,Uid:86f7d333-22c4-4d19-b6ba-f4cf43ce1598,Namespace:calico-system,Attempt:1,} returns sandbox id \"755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113\"" May 13 07:17:10.495913 env[1159]: time="2025-05-13T07:17:10.495889760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 07:17:10.652000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit: BPF prog-id=154 op=LOAD May 13 07:17:10.652000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd4172a40 a2=40 a3=1 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.652000 audit: BPF prog-id=154 op=UNLOAD May 13 07:17:10.652000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.652000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdd4172b10 a2=50 a3=7ffdd4172bf0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd4172a50 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd4172a80 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd4172990 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd4172aa0 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd4172a80 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd4172a70 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd4172aa0 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd4172a80 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd4172aa0 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd4172a70 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd4172ae0 a2=28 a3=0 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd4172890 a2=50 a3=1 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit: BPF prog-id=155 op=LOAD May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd4172890 a2=94 a3=5 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit: BPF prog-id=155 op=UNLOAD May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd4172940 a2=50 a3=1 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdd4172a60 a2=4 a3=38 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.662000 audit[3491]: AVC avc: denied { confidentiality } for pid=3491 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 07:17:10.662000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd4172ab0 a2=94 a3=6 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.663000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { confidentiality } for pid=3491 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 07:17:10.663000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd4172260 a2=94 a3=83 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.663000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.663000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd4172260 a2=94 a3=83 items=0 ppid=3336 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.663000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 07:17:10.672000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.672000 audit: BPF prog-id=156 op=LOAD May 13 07:17:10.672000 audit[3572]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7b3c7de0 a2=98 a3=1999999999999999 items=0 ppid=3336 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.672000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 07:17:10.673000 audit: BPF prog-id=156 op=UNLOAD May 13 07:17:10.673000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.673000 audit: BPF prog-id=157 op=LOAD May 13 07:17:10.673000 audit[3572]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7b3c7cc0 a2=74 a3=ffff items=0 ppid=3336 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.673000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 07:17:10.674000 audit: BPF prog-id=157 op=UNLOAD May 13 07:17:10.674000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.674000 audit: BPF prog-id=158 op=LOAD May 13 07:17:10.674000 audit[3572]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7b3c7d00 a2=40 a3=7ffd7b3c7ee0 items=0 ppid=3336 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.674000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 07:17:10.675000 audit: BPF prog-id=158 op=UNLOAD May 13 07:17:10.760571 systemd-networkd[987]: vxlan.calico: Link UP May 13 07:17:10.760580 systemd-networkd[987]: vxlan.calico: Gained carrier May 13 07:17:10.796000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.796000 audit: BPF prog-id=159 op=LOAD May 13 07:17:10.796000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec951e5b0 a2=98 a3=100 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.796000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.796000 audit: BPF prog-id=159 op=UNLOAD May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit: BPF prog-id=160 op=LOAD May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec951e3c0 a2=74 a3=540051 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit: BPF prog-id=160 op=UNLOAD May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit: BPF prog-id=161 op=LOAD May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec951e3f0 a2=94 a3=2 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit: BPF prog-id=161 op=UNLOAD May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec951e2c0 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec951e2f0 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec951e200 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec951e310 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec951e2f0 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec951e2e0 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec951e310 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec951e2f0 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec951e310 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec951e2e0 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffec951e350 a2=28 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.797000 audit: BPF prog-id=162 op=LOAD May 13 07:17:10.797000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec951e1c0 a2=40 a3=0 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.797000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.797000 audit: BPF prog-id=162 op=UNLOAD May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffec951e1b0 a2=50 a3=2800 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffec951e1b0 a2=50 a3=2800 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit: BPF prog-id=163 op=LOAD May 13 07:17:10.798000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec951d9d0 a2=94 a3=2 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.798000 audit: BPF prog-id=163 op=UNLOAD May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.798000 audit: BPF prog-id=164 op=LOAD May 13 07:17:10.798000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec951dad0 a2=94 a3=30 items=0 ppid=3336 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.802000 audit: BPF prog-id=165 op=LOAD May 13 07:17:10.802000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff3d08e9f0 a2=98 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.802000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.803000 audit: BPF prog-id=165 op=UNLOAD May 13 07:17:10.803000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit: BPF prog-id=166 op=LOAD May 13 07:17:10.803000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3d08e7d0 a2=74 a3=540051 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.803000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.803000 audit: BPF prog-id=166 op=UNLOAD May 13 07:17:10.803000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.803000 audit: BPF prog-id=167 op=LOAD May 13 07:17:10.803000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3d08e800 a2=94 a3=2 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.803000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.803000 audit: BPF prog-id=167 op=UNLOAD May 13 07:17:10.905991 env[1159]: time="2025-05-13T07:17:10.905951833Z" level=info msg="StopPodSandbox for \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\"" May 13 07:17:10.906360 env[1159]: time="2025-05-13T07:17:10.906294078Z" level=info msg="StopPodSandbox for \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\"" May 13 07:17:10.957000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.957000 audit: BPF prog-id=168 op=LOAD May 13 07:17:10.957000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3d08e6c0 a2=40 a3=1 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.957000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.957000 audit: BPF prog-id=168 op=UNLOAD May 13 07:17:10.958000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.958000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff3d08e790 a2=50 a3=7fff3d08e870 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.958000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.973000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.973000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d08e6d0 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.973000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.973000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3d08e700 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.973000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.973000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3d08e610 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.974000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.974000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d08e720 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.974000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.974000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d08e700 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.974000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.974000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d08e6f0 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.974000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.974000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d08e720 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.974000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.974000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3d08e700 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.974000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.974000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3d08e720 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.974000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.974000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3d08e6f0 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.974000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.974000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d08e760 a2=28 a3=0 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3d08e510 a2=50 a3=1 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit: BPF prog-id=169 op=LOAD May 13 07:17:10.975000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff3d08e510 a2=94 a3=5 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.975000 audit: BPF prog-id=169 op=UNLOAD May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3d08e5c0 a2=50 a3=1 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff3d08e6e0 a2=4 a3=38 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.975000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 07:17:10.975000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3d08e730 a2=94 a3=6 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.975000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.977000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 07:17:10.977000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3d08dee0 a2=94 a3=83 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.978000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 07:17:10.978000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3d08dee0 a2=94 a3=83 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.979000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.979000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3d08f920 a2=10 a3=f0f1 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.979000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.979000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3d08f7c0 a2=10 a3=3 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.979000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.979000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3d08f760 a2=10 a3=3 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.979000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:10.979000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3d08f760 a2=10 a3=7 items=0 ppid=3336 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:10.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 07:17:10.999000 audit: BPF prog-id=164 op=UNLOAD May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.030 [INFO][3634] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.030 [INFO][3634] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" iface="eth0" netns="/var/run/netns/cni-2a4cbe42-8c1e-ff88-e00c-1598e65fff66" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.030 [INFO][3634] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" iface="eth0" netns="/var/run/netns/cni-2a4cbe42-8c1e-ff88-e00c-1598e65fff66" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.032 [INFO][3634] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" iface="eth0" netns="/var/run/netns/cni-2a4cbe42-8c1e-ff88-e00c-1598e65fff66" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.032 [INFO][3634] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.032 [INFO][3634] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.075 [INFO][3662] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.075 [INFO][3662] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.075 [INFO][3662] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.094 [WARNING][3662] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.094 [INFO][3662] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.100 [INFO][3662] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:11.104537 env[1159]: 2025-05-13 07:17:11.103 [INFO][3634] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:11.107790 env[1159]: time="2025-05-13T07:17:11.104669408Z" level=info msg="TearDown network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\" successfully" May 13 07:17:11.107790 env[1159]: time="2025-05-13T07:17:11.104702510Z" level=info msg="StopPodSandbox for \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\" returns successfully" May 13 07:17:11.107790 env[1159]: time="2025-05-13T07:17:11.106566494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85bff8447f-wgtt6,Uid:ed427429-a83c-40b7-b584-f943deea24bc,Namespace:calico-system,Attempt:1,}" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.026 [INFO][3633] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.026 [INFO][3633] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" iface="eth0" netns="/var/run/netns/cni-3ec0e76d-e4fa-5c52-9b46-98ec358a3134" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.026 [INFO][3633] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" iface="eth0" netns="/var/run/netns/cni-3ec0e76d-e4fa-5c52-9b46-98ec358a3134" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.026 [INFO][3633] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" iface="eth0" netns="/var/run/netns/cni-3ec0e76d-e4fa-5c52-9b46-98ec358a3134" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.026 [INFO][3633] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.026 [INFO][3633] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.083 [INFO][3657] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.083 [INFO][3657] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.103 [INFO][3657] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.123 [WARNING][3657] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.123 [INFO][3657] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.126 [INFO][3657] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:11.128787 env[1159]: 2025-05-13 07:17:11.127 [INFO][3633] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:11.129347 env[1159]: time="2025-05-13T07:17:11.128894272Z" level=info msg="TearDown network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\" successfully" May 13 07:17:11.129347 env[1159]: time="2025-05-13T07:17:11.128924088Z" level=info msg="StopPodSandbox for \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\" returns successfully" May 13 07:17:11.130128 env[1159]: time="2025-05-13T07:17:11.130095437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c7964b5fc-8ngvg,Uid:1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d,Namespace:calico-apiserver,Attempt:1,}" May 13 07:17:11.204358 systemd[1]: run-netns-cni\x2d2a4cbe42\x2d8c1e\x2dff88\x2de00c\x2d1598e65fff66.mount: Deactivated successfully. May 13 07:17:11.204452 systemd[1]: run-netns-cni\x2d3ec0e76d\x2de4fa\x2d5c52\x2d9b46\x2d98ec358a3134.mount: Deactivated successfully. May 13 07:17:11.229401 systemd-networkd[987]: calid7addcda960: Gained IPv6LL May 13 07:17:11.244000 audit[3704]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3704 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:11.244000 audit[3704]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc13e538a0 a2=0 a3=7ffc13e5388c items=0 ppid=3336 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.244000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:11.254000 audit[3703]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3703 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:11.254000 audit[3703]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc482c0640 a2=0 a3=7ffc482c062c items=0 ppid=3336 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.254000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:11.263000 audit[3702]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3702 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:11.263000 audit[3702]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd157fe010 a2=0 a3=7ffd157fdffc items=0 ppid=3336 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.263000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:11.279000 audit[3709]: NETFILTER_CFG table=filter:104 family=2 entries=99 op=nft_register_chain pid=3709 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:11.279000 audit[3709]: SYSCALL arch=c000003e syscall=46 success=yes exit=53840 a0=3 a1=7ffea3ebca20 a2=0 a3=7ffea3ebca0c items=0 ppid=3336 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.279000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:11.436320 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9e663d72b8e: link becomes ready May 13 07:17:11.436816 systemd-networkd[987]: cali9e663d72b8e: Link UP May 13 07:17:11.437013 systemd-networkd[987]: cali9e663d72b8e: Gained carrier May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.262 [INFO][3675] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0 calico-kube-controllers-85bff8447f- calico-system ed427429-a83c-40b7-b584-f943deea24bc 827 0 2025-05-13 07:16:40 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:85bff8447f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-n-1a4ba3031a.novalocal calico-kube-controllers-85bff8447f-wgtt6 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali9e663d72b8e [] []}} ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Namespace="calico-system" Pod="calico-kube-controllers-85bff8447f-wgtt6" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.262 [INFO][3675] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Namespace="calico-system" Pod="calico-kube-controllers-85bff8447f-wgtt6" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.347 [INFO][3715] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" HandleID="k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.369 [INFO][3715] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" HandleID="k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312a40), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-1a4ba3031a.novalocal", "pod":"calico-kube-controllers-85bff8447f-wgtt6", "timestamp":"2025-05-13 07:17:11.347760262 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1a4ba3031a.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.369 [INFO][3715] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.369 [INFO][3715] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.369 [INFO][3715] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1a4ba3031a.novalocal' May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.373 [INFO][3715] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.379 [INFO][3715] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.398 [INFO][3715] ipam/ipam.go 489: Trying affinity for 192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.401 [INFO][3715] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.406 [INFO][3715] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.406 [INFO][3715] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.409 [INFO][3715] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.415 [INFO][3715] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.429 [INFO][3715] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.3/26] block=192.168.113.0/26 handle="k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.429 [INFO][3715] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.3/26] handle="k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.429 [INFO][3715] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:11.451559 env[1159]: 2025-05-13 07:17:11.430 [INFO][3715] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.3/26] IPv6=[] ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" HandleID="k8s-pod-network.c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.452550 env[1159]: 2025-05-13 07:17:11.431 [INFO][3675] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Namespace="calico-system" Pod="calico-kube-controllers-85bff8447f-wgtt6" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0", GenerateName:"calico-kube-controllers-85bff8447f-", Namespace:"calico-system", SelfLink:"", UID:"ed427429-a83c-40b7-b584-f943deea24bc", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85bff8447f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"", Pod:"calico-kube-controllers-85bff8447f-wgtt6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9e663d72b8e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:11.452550 env[1159]: 2025-05-13 07:17:11.431 [INFO][3675] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.3/32] ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Namespace="calico-system" Pod="calico-kube-controllers-85bff8447f-wgtt6" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.452550 env[1159]: 2025-05-13 07:17:11.431 [INFO][3675] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9e663d72b8e ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Namespace="calico-system" Pod="calico-kube-controllers-85bff8447f-wgtt6" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.452550 env[1159]: 2025-05-13 07:17:11.433 [INFO][3675] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Namespace="calico-system" Pod="calico-kube-controllers-85bff8447f-wgtt6" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.452550 env[1159]: 2025-05-13 07:17:11.433 [INFO][3675] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Namespace="calico-system" Pod="calico-kube-controllers-85bff8447f-wgtt6" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0", GenerateName:"calico-kube-controllers-85bff8447f-", Namespace:"calico-system", SelfLink:"", UID:"ed427429-a83c-40b7-b584-f943deea24bc", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85bff8447f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc", Pod:"calico-kube-controllers-85bff8447f-wgtt6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9e663d72b8e", MAC:"f2:a5:07:40:2e:92", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:11.452550 env[1159]: 2025-05-13 07:17:11.449 [INFO][3675] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc" Namespace="calico-system" Pod="calico-kube-controllers-85bff8447f-wgtt6" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:11.475745 env[1159]: time="2025-05-13T07:17:11.470500272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:17:11.475745 env[1159]: time="2025-05-13T07:17:11.470540487Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:17:11.475745 env[1159]: time="2025-05-13T07:17:11.470554233Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:17:11.475745 env[1159]: time="2025-05-13T07:17:11.470669360Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc pid=3750 runtime=io.containerd.runc.v2 May 13 07:17:11.506809 systemd[1]: run-containerd-runc-k8s.io-c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc-runc.UmsVPG.mount: Deactivated successfully. May 13 07:17:11.509067 systemd[1]: Started cri-containerd-c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc.scope. May 13 07:17:11.516000 audit[3769]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=3769 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:11.516000 audit[3769]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffd9216b3c0 a2=0 a3=7ffd9216b3ac items=0 ppid=3336 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.516000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:11.523199 systemd-networkd[987]: calie5af977373d: Link UP May 13 07:17:11.523361 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie5af977373d: link becomes ready May 13 07:17:11.524518 systemd-networkd[987]: calie5af977373d: Gained carrier May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.294 [INFO][3687] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0 calico-apiserver-c7964b5fc- calico-apiserver 1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d 826 0 2025-05-13 07:16:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c7964b5fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-1a4ba3031a.novalocal calico-apiserver-c7964b5fc-8ngvg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie5af977373d [] []}} ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-8ngvg" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.296 [INFO][3687] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-8ngvg" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.388 [INFO][3723] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" HandleID="k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.407 [INFO][3723] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" HandleID="k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000200ba0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-1a4ba3031a.novalocal", "pod":"calico-apiserver-c7964b5fc-8ngvg", "timestamp":"2025-05-13 07:17:11.388804809 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1a4ba3031a.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.407 [INFO][3723] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.430 [INFO][3723] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.430 [INFO][3723] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1a4ba3031a.novalocal' May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.446 [INFO][3723] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.460 [INFO][3723] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.471 [INFO][3723] ipam/ipam.go 489: Trying affinity for 192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.480 [INFO][3723] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.484 [INFO][3723] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.484 [INFO][3723] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.486 [INFO][3723] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18 May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.495 [INFO][3723] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.516 [INFO][3723] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.4/26] block=192.168.113.0/26 handle="k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.516 [INFO][3723] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.4/26] handle="k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.516 [INFO][3723] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:11.539270 env[1159]: 2025-05-13 07:17:11.516 [INFO][3723] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.4/26] IPv6=[] ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" HandleID="k8s-pod-network.4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.539945 env[1159]: 2025-05-13 07:17:11.519 [INFO][3687] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-8ngvg" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0", GenerateName:"calico-apiserver-c7964b5fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c7964b5fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"", Pod:"calico-apiserver-c7964b5fc-8ngvg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5af977373d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:11.539945 env[1159]: 2025-05-13 07:17:11.519 [INFO][3687] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.4/32] ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-8ngvg" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.539945 env[1159]: 2025-05-13 07:17:11.519 [INFO][3687] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie5af977373d ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-8ngvg" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.539945 env[1159]: 2025-05-13 07:17:11.522 [INFO][3687] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-8ngvg" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.539945 env[1159]: 2025-05-13 07:17:11.524 [INFO][3687] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-8ngvg" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0", GenerateName:"calico-apiserver-c7964b5fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c7964b5fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18", Pod:"calico-apiserver-c7964b5fc-8ngvg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5af977373d", MAC:"e2:19:6d:5a:6b:e5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:11.539945 env[1159]: 2025-05-13 07:17:11.537 [INFO][3687] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-8ngvg" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:11.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit: BPF prog-id=170 op=LOAD May 13 07:17:11.553000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3750 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313937346262613838616536343639383732616333633039376336 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3750 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313937346262613838616536343639383732616333633039376336 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.553000 audit: BPF prog-id=171 op=LOAD May 13 07:17:11.553000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002c6fa0 items=0 ppid=3750 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313937346262613838616536343639383732616333633039376336 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit: BPF prog-id=172 op=LOAD May 13 07:17:11.554000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002c6fe8 items=0 ppid=3750 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313937346262613838616536343639383732616333633039376336 May 13 07:17:11.554000 audit: BPF prog-id=172 op=UNLOAD May 13 07:17:11.554000 audit: BPF prog-id=171 op=UNLOAD May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { perfmon } for pid=3761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit[3761]: AVC avc: denied { bpf } for pid=3761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.554000 audit: BPF prog-id=173 op=LOAD May 13 07:17:11.554000 audit[3761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002c73f8 items=0 ppid=3750 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313937346262613838616536343639383732616333633039376336 May 13 07:17:11.566674 env[1159]: time="2025-05-13T07:17:11.566602827Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:17:11.566868 env[1159]: time="2025-05-13T07:17:11.566843391Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:17:11.566978 env[1159]: time="2025-05-13T07:17:11.566955623Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:17:11.567241 env[1159]: time="2025-05-13T07:17:11.567194834Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18 pid=3795 runtime=io.containerd.runc.v2 May 13 07:17:11.574000 audit[3803]: NETFILTER_CFG table=filter:106 family=2 entries=52 op=nft_register_chain pid=3803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:11.574000 audit[3803]: SYSCALL arch=c000003e syscall=46 success=yes exit=27056 a0=3 a1=7ffe74aa70e0 a2=0 a3=7ffe74aa70cc items=0 ppid=3336 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.574000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:11.586755 systemd[1]: Started cri-containerd-4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18.scope. May 13 07:17:11.603588 env[1159]: time="2025-05-13T07:17:11.603538287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85bff8447f-wgtt6,Uid:ed427429-a83c-40b7-b584-f943deea24bc,Namespace:calico-system,Attempt:1,} returns sandbox id \"c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc\"" May 13 07:17:11.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.615000 audit: BPF prog-id=174 op=LOAD May 13 07:17:11.616000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3795 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616363366162326361663637343836633134356439373662376430 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3795 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616363366162326361663637343836633134356439373662376430 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.616000 audit: BPF prog-id=175 op=LOAD May 13 07:17:11.616000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d84e0 items=0 ppid=3795 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616363366162326361663637343836633134356439373662376430 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.617000 audit: BPF prog-id=176 op=LOAD May 13 07:17:11.617000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d8528 items=0 ppid=3795 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616363366162326361663637343836633134356439373662376430 May 13 07:17:11.617000 audit: BPF prog-id=176 op=UNLOAD May 13 07:17:11.617000 audit: BPF prog-id=175 op=UNLOAD May 13 07:17:11.618000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:11.618000 audit: BPF prog-id=177 op=LOAD May 13 07:17:11.618000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d8938 items=0 ppid=3795 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:11.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616363366162326361663637343836633134356439373662376430 May 13 07:17:11.649795 env[1159]: time="2025-05-13T07:17:11.649758012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c7964b5fc-8ngvg,Uid:1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18\"" May 13 07:17:11.933643 systemd-networkd[987]: calif391510a370: Gained IPv6LL May 13 07:17:12.573386 systemd-networkd[987]: vxlan.calico: Gained IPv6LL May 13 07:17:12.637435 systemd-networkd[987]: calie5af977373d: Gained IPv6LL May 13 07:17:12.905226 env[1159]: time="2025-05-13T07:17:12.905186711Z" level=info msg="StopPodSandbox for \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\"" May 13 07:17:12.923234 env[1159]: time="2025-05-13T07:17:12.923180664Z" level=info msg="StopPodSandbox for \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\"" May 13 07:17:13.027857 env[1159]: time="2025-05-13T07:17:13.027818040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:13.031652 env[1159]: time="2025-05-13T07:17:13.031616320Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:13.033810 env[1159]: time="2025-05-13T07:17:13.033784466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:13.036004 env[1159]: time="2025-05-13T07:17:13.035951782Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:13.036638 env[1159]: time="2025-05-13T07:17:13.036606907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 07:17:13.039908 env[1159]: time="2025-05-13T07:17:13.039872232Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 07:17:13.041834 env[1159]: time="2025-05-13T07:17:13.041660713Z" level=info msg="CreateContainer within sandbox \"755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.015 [INFO][3867] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.015 [INFO][3867] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" iface="eth0" netns="/var/run/netns/cni-ba8f5333-828a-26d0-5392-5cc25dc0d7b0" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.016 [INFO][3867] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" iface="eth0" netns="/var/run/netns/cni-ba8f5333-828a-26d0-5392-5cc25dc0d7b0" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.017 [INFO][3867] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" iface="eth0" netns="/var/run/netns/cni-ba8f5333-828a-26d0-5392-5cc25dc0d7b0" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.017 [INFO][3867] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.017 [INFO][3867] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.065 [INFO][3880] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.069 [INFO][3880] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.070 [INFO][3880] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.079 [WARNING][3880] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.079 [INFO][3880] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.081 [INFO][3880] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:13.085019 env[1159]: 2025-05-13 07:17:13.083 [INFO][3867] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:13.086308 systemd-networkd[987]: cali9e663d72b8e: Gained IPv6LL May 13 07:17:13.089985 systemd[1]: run-netns-cni\x2dba8f5333\x2d828a\x2d26d0\x2d5392\x2d5cc25dc0d7b0.mount: Deactivated successfully. May 13 07:17:13.102235 env[1159]: time="2025-05-13T07:17:13.102187003Z" level=info msg="TearDown network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\" successfully" May 13 07:17:13.102541 env[1159]: time="2025-05-13T07:17:13.102520411Z" level=info msg="StopPodSandbox for \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\" returns successfully" May 13 07:17:13.103332 env[1159]: time="2025-05-13T07:17:13.103306352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c7964b5fc-gmfjr,Uid:53ac7b8b-cefd-4053-8ae9-cd52eaed3172,Namespace:calico-apiserver,Attempt:1,}" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.020 [INFO][3866] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.020 [INFO][3866] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" iface="eth0" netns="/var/run/netns/cni-5bae36ae-4af7-60c6-8552-97f3e9ea7b9c" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.020 [INFO][3866] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" iface="eth0" netns="/var/run/netns/cni-5bae36ae-4af7-60c6-8552-97f3e9ea7b9c" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.021 [INFO][3866] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" iface="eth0" netns="/var/run/netns/cni-5bae36ae-4af7-60c6-8552-97f3e9ea7b9c" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.021 [INFO][3866] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.021 [INFO][3866] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.081 [INFO][3885] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.082 [INFO][3885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.082 [INFO][3885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.100 [WARNING][3885] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.100 [INFO][3885] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.110 [INFO][3885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:13.112903 env[1159]: 2025-05-13 07:17:13.111 [INFO][3866] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:13.117932 systemd[1]: run-netns-cni\x2d5bae36ae\x2d4af7\x2d60c6\x2d8552\x2d97f3e9ea7b9c.mount: Deactivated successfully. May 13 07:17:13.123025 env[1159]: time="2025-05-13T07:17:13.122987140Z" level=info msg="TearDown network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\" successfully" May 13 07:17:13.123816 env[1159]: time="2025-05-13T07:17:13.123787309Z" level=info msg="StopPodSandbox for \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\" returns successfully" May 13 07:17:13.128193 env[1159]: time="2025-05-13T07:17:13.128148118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8fqxr,Uid:73598660-7840-43c4-995c-6743bc978bfe,Namespace:kube-system,Attempt:1,}" May 13 07:17:13.136996 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2715328266.mount: Deactivated successfully. May 13 07:17:13.154683 env[1159]: time="2025-05-13T07:17:13.154637239Z" level=info msg="CreateContainer within sandbox \"755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a38abe667114ad5d6890a9551a64aa9f774324f80a2ac763756125b338a0b79f\"" May 13 07:17:13.155919 env[1159]: time="2025-05-13T07:17:13.155556092Z" level=info msg="StartContainer for \"a38abe667114ad5d6890a9551a64aa9f774324f80a2ac763756125b338a0b79f\"" May 13 07:17:13.180073 systemd[1]: Started cri-containerd-a38abe667114ad5d6890a9551a64aa9f774324f80a2ac763756125b338a0b79f.scope. May 13 07:17:13.243000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.243000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f70ec8b3c68 items=0 ppid=3526 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386162653636373131346164356436383930613935353161363461 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit: BPF prog-id=178 op=LOAD May 13 07:17:13.244000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000098e08 items=0 ppid=3526 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386162653636373131346164356436383930613935353161363461 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit: BPF prog-id=179 op=LOAD May 13 07:17:13.244000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000098e58 items=0 ppid=3526 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386162653636373131346164356436383930613935353161363461 May 13 07:17:13.244000 audit: BPF prog-id=179 op=UNLOAD May 13 07:17:13.244000 audit: BPF prog-id=178 op=UNLOAD May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.244000 audit: BPF prog-id=180 op=LOAD May 13 07:17:13.244000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000098ee8 items=0 ppid=3526 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133386162653636373131346164356436383930613935353161363461 May 13 07:17:13.280579 env[1159]: time="2025-05-13T07:17:13.280535784Z" level=info msg="StartContainer for \"a38abe667114ad5d6890a9551a64aa9f774324f80a2ac763756125b338a0b79f\" returns successfully" May 13 07:17:13.378679 systemd-networkd[987]: cali78bb033f1cc: Link UP May 13 07:17:13.382552 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 07:17:13.382613 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali78bb033f1cc: link becomes ready May 13 07:17:13.382842 systemd-networkd[987]: cali78bb033f1cc: Gained carrier May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.265 [INFO][3909] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0 calico-apiserver-c7964b5fc- calico-apiserver 53ac7b8b-cefd-4053-8ae9-cd52eaed3172 841 0 2025-05-13 07:16:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c7964b5fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-1a4ba3031a.novalocal calico-apiserver-c7964b5fc-gmfjr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali78bb033f1cc [] []}} ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-gmfjr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.265 [INFO][3909] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-gmfjr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.309 [INFO][3959] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" HandleID="k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.325 [INFO][3959] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" HandleID="k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029f440), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-1a4ba3031a.novalocal", "pod":"calico-apiserver-c7964b5fc-gmfjr", "timestamp":"2025-05-13 07:17:13.309231795 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1a4ba3031a.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.326 [INFO][3959] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.326 [INFO][3959] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.326 [INFO][3959] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1a4ba3031a.novalocal' May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.328 [INFO][3959] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.333 [INFO][3959] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.338 [INFO][3959] ipam/ipam.go 489: Trying affinity for 192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.341 [INFO][3959] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.343 [INFO][3959] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.343 [INFO][3959] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.346 [INFO][3959] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69 May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.351 [INFO][3959] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.362 [INFO][3959] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.5/26] block=192.168.113.0/26 handle="k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.363 [INFO][3959] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.5/26] handle="k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.363 [INFO][3959] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:13.400159 env[1159]: 2025-05-13 07:17:13.363 [INFO][3959] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.5/26] IPv6=[] ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" HandleID="k8s-pod-network.514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.400903 env[1159]: 2025-05-13 07:17:13.364 [INFO][3909] cni-plugin/k8s.go 386: Populated endpoint ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-gmfjr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0", GenerateName:"calico-apiserver-c7964b5fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"53ac7b8b-cefd-4053-8ae9-cd52eaed3172", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c7964b5fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"", Pod:"calico-apiserver-c7964b5fc-gmfjr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali78bb033f1cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:13.400903 env[1159]: 2025-05-13 07:17:13.364 [INFO][3909] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.5/32] ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-gmfjr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.400903 env[1159]: 2025-05-13 07:17:13.364 [INFO][3909] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali78bb033f1cc ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-gmfjr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.400903 env[1159]: 2025-05-13 07:17:13.382 [INFO][3909] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-gmfjr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.400903 env[1159]: 2025-05-13 07:17:13.383 [INFO][3909] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-gmfjr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0", GenerateName:"calico-apiserver-c7964b5fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"53ac7b8b-cefd-4053-8ae9-cd52eaed3172", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c7964b5fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69", Pod:"calico-apiserver-c7964b5fc-gmfjr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali78bb033f1cc", MAC:"b6:49:ef:a2:56:f0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:13.400903 env[1159]: 2025-05-13 07:17:13.398 [INFO][3909] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69" Namespace="calico-apiserver" Pod="calico-apiserver-c7964b5fc-gmfjr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:13.422659 env[1159]: time="2025-05-13T07:17:13.422505121Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:17:13.422659 env[1159]: time="2025-05-13T07:17:13.422604268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:17:13.424602 env[1159]: time="2025-05-13T07:17:13.422634616Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:17:13.424873 env[1159]: time="2025-05-13T07:17:13.424789838Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69 pid=3989 runtime=io.containerd.runc.v2 May 13 07:17:13.433000 audit[3994]: NETFILTER_CFG table=filter:107 family=2 entries=46 op=nft_register_chain pid=3994 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:13.436335 kernel: kauditd_printk_skb: 900 callbacks suppressed May 13 07:17:13.436400 kernel: audit: type=1325 audit(1747120633.433:1159): table=filter:107 family=2 entries=46 op=nft_register_chain pid=3994 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:13.433000 audit[3994]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffe76c3dac0 a2=0 a3=7ffe76c3daac items=0 ppid=3336 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.453457 systemd[1]: run-containerd-runc-k8s.io-514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69-runc.DGikxG.mount: Deactivated successfully. May 13 07:17:13.458441 kernel: audit: type=1300 audit(1747120633.433:1159): arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffe76c3dac0 a2=0 a3=7ffe76c3daac items=0 ppid=3336 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.433000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:13.466408 kernel: audit: type=1327 audit(1747120633.433:1159): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:13.467578 systemd-networkd[987]: cali7d18a1fdf0e: Link UP May 13 07:17:13.480799 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7d18a1fdf0e: link becomes ready May 13 07:17:13.478407 systemd[1]: Started cri-containerd-514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69.scope. May 13 07:17:13.481499 systemd-networkd[987]: cali7d18a1fdf0e: Gained carrier May 13 07:17:13.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.514965 kernel: audit: type=1400 audit(1747120633.502:1160): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.515026 kernel: audit: type=1400 audit(1747120633.502:1161): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.263 [INFO][3910] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0 coredns-7db6d8ff4d- kube-system 73598660-7840-43c4-995c-6743bc978bfe 842 0 2025-05-13 07:16:32 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-1a4ba3031a.novalocal coredns-7db6d8ff4d-8fqxr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7d18a1fdf0e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8fqxr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.263 [INFO][3910] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8fqxr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.311 [INFO][3954] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" HandleID="k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.327 [INFO][3954] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" HandleID="k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000332d50), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-1a4ba3031a.novalocal", "pod":"coredns-7db6d8ff4d-8fqxr", "timestamp":"2025-05-13 07:17:13.311890516 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1a4ba3031a.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.327 [INFO][3954] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.363 [INFO][3954] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.363 [INFO][3954] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1a4ba3031a.novalocal' May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.376 [INFO][3954] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.388 [INFO][3954] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.398 [INFO][3954] ipam/ipam.go 489: Trying affinity for 192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.402 [INFO][3954] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.406 [INFO][3954] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.0/26 host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.406 [INFO][3954] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.0/26 handle="k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.410 [INFO][3954] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2 May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.416 [INFO][3954] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.0/26 handle="k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.448 [INFO][3954] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.6/26] block=192.168.113.0/26 handle="k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.448 [INFO][3954] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.6/26] handle="k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" host="ci-3510-3-7-n-1a4ba3031a.novalocal" May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.448 [INFO][3954] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:13.517887 env[1159]: 2025-05-13 07:17:13.448 [INFO][3954] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.6/26] IPv6=[] ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" HandleID="k8s-pod-network.5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.518689 env[1159]: 2025-05-13 07:17:13.463 [INFO][3910] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8fqxr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"73598660-7840-43c4-995c-6743bc978bfe", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"", Pod:"coredns-7db6d8ff4d-8fqxr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d18a1fdf0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:13.518689 env[1159]: 2025-05-13 07:17:13.463 [INFO][3910] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.6/32] ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8fqxr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.518689 env[1159]: 2025-05-13 07:17:13.463 [INFO][3910] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7d18a1fdf0e ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8fqxr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.518689 env[1159]: 2025-05-13 07:17:13.484 [INFO][3910] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8fqxr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.518689 env[1159]: 2025-05-13 07:17:13.493 [INFO][3910] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8fqxr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"73598660-7840-43c4-995c-6743bc978bfe", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2", Pod:"coredns-7db6d8ff4d-8fqxr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d18a1fdf0e", MAC:"32:e4:48:85:a5:e7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:13.518689 env[1159]: 2025-05-13 07:17:13.515 [INFO][3910] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8fqxr" WorkloadEndpoint="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:13.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.525319 kernel: audit: type=1400 audit(1747120633.502:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.536809 kernel: audit: type=1400 audit(1747120633.502:1163): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.536898 kernel: audit: type=1400 audit(1747120633.502:1164): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.544383 kernel: audit: type=1400 audit(1747120633.502:1165): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.552288 kernel: audit: type=1400 audit(1747120633.502:1166): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.555469 env[1159]: time="2025-05-13T07:17:13.555404722Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 07:17:13.555469 env[1159]: time="2025-05-13T07:17:13.555445329Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 07:17:13.555631 env[1159]: time="2025-05-13T07:17:13.555459696Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 07:17:13.555631 env[1159]: time="2025-05-13T07:17:13.555580253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2 pid=4038 runtime=io.containerd.runc.v2 May 13 07:17:13.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.517000 audit: BPF prog-id=181 op=LOAD May 13 07:17:13.518000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.518000 audit[3999]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3989 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346635303732313461346661353762313261633231373331646136 May 13 07:17:13.518000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.518000 audit[3999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3989 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346635303732313461346661353762313261633231373331646136 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit: BPF prog-id=182 op=LOAD May 13 07:17:13.524000 audit[3999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00021c7f0 items=0 ppid=3989 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346635303732313461346661353762313261633231373331646136 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit: BPF prog-id=183 op=LOAD May 13 07:17:13.524000 audit[3999]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00021c838 items=0 ppid=3989 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346635303732313461346661353762313261633231373331646136 May 13 07:17:13.524000 audit: BPF prog-id=183 op=UNLOAD May 13 07:17:13.524000 audit: BPF prog-id=182 op=UNLOAD May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { perfmon } for pid=3999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit[3999]: AVC avc: denied { bpf } for pid=3999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.524000 audit: BPF prog-id=184 op=LOAD May 13 07:17:13.524000 audit[3999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00021cc48 items=0 ppid=3989 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346635303732313461346661353762313261633231373331646136 May 13 07:17:13.545000 audit[4028]: NETFILTER_CFG table=filter:108 family=2 entries=52 op=nft_register_chain pid=4028 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 07:17:13.545000 audit[4028]: SYSCALL arch=c000003e syscall=46 success=yes exit=24636 a0=3 a1=7fff56874780 a2=0 a3=7fff5687476c items=0 ppid=3336 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 07:17:13.568860 systemd[1]: Started cri-containerd-5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2.scope. May 13 07:17:13.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit: BPF prog-id=185 op=LOAD May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4038 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393932666362396137646134613730356531653633346133356362 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4038 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393932666362396137646134613730356531653633346133356362 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit: BPF prog-id=186 op=LOAD May 13 07:17:13.591000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002edd90 items=0 ppid=4038 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393932666362396137646134613730356531653633346133356362 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit: BPF prog-id=187 op=LOAD May 13 07:17:13.591000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002eddd8 items=0 ppid=4038 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393932666362396137646134613730356531653633346133356362 May 13 07:17:13.591000 audit: BPF prog-id=187 op=UNLOAD May 13 07:17:13.591000 audit: BPF prog-id=186 op=UNLOAD May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { perfmon } for pid=4047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit[4047]: AVC avc: denied { bpf } for pid=4047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.591000 audit: BPF prog-id=188 op=LOAD May 13 07:17:13.591000 audit[4047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e21e8 items=0 ppid=4038 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393932666362396137646134613730356531653633346133356362 May 13 07:17:13.610236 env[1159]: time="2025-05-13T07:17:13.610197033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c7964b5fc-gmfjr,Uid:53ac7b8b-cefd-4053-8ae9-cd52eaed3172,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69\"" May 13 07:17:13.627322 env[1159]: time="2025-05-13T07:17:13.627285825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8fqxr,Uid:73598660-7840-43c4-995c-6743bc978bfe,Namespace:kube-system,Attempt:1,} returns sandbox id \"5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2\"" May 13 07:17:13.632180 env[1159]: time="2025-05-13T07:17:13.632145896Z" level=info msg="CreateContainer within sandbox \"5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 07:17:13.657812 env[1159]: time="2025-05-13T07:17:13.657695186Z" level=info msg="CreateContainer within sandbox \"5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3df00691e1c507b250739c009d6d52606a9305f44150913cdb77e41dd70ab827\"" May 13 07:17:13.659467 env[1159]: time="2025-05-13T07:17:13.659437390Z" level=info msg="StartContainer for \"3df00691e1c507b250739c009d6d52606a9305f44150913cdb77e41dd70ab827\"" May 13 07:17:13.686720 systemd[1]: Started cri-containerd-3df00691e1c507b250739c009d6d52606a9305f44150913cdb77e41dd70ab827.scope. May 13 07:17:13.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.706000 audit: BPF prog-id=189 op=LOAD May 13 07:17:13.707000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4038 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663030363931653163353037623235303733396330303964366435 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4038 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663030363931653163353037623235303733396330303964366435 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.707000 audit: BPF prog-id=190 op=LOAD May 13 07:17:13.707000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003be950 items=0 ppid=4038 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663030363931653163353037623235303733396330303964366435 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.708000 audit: BPF prog-id=191 op=LOAD May 13 07:17:13.708000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003be998 items=0 ppid=4038 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663030363931653163353037623235303733396330303964366435 May 13 07:17:13.709000 audit: BPF prog-id=191 op=UNLOAD May 13 07:17:13.709000 audit: BPF prog-id=190 op=UNLOAD May 13 07:17:13.709000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:13.709000 audit: BPF prog-id=192 op=LOAD May 13 07:17:13.709000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003beda8 items=0 ppid=4038 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:13.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663030363931653163353037623235303733396330303964366435 May 13 07:17:13.730443 env[1159]: time="2025-05-13T07:17:13.730398469Z" level=info msg="StartContainer for \"3df00691e1c507b250739c009d6d52606a9305f44150913cdb77e41dd70ab827\" returns successfully" May 13 07:17:14.306697 kubelet[2039]: I0513 07:17:14.306636 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-8fqxr" podStartSLOduration=42.306618735 podStartE2EDuration="42.306618735s" podCreationTimestamp="2025-05-13 07:16:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 07:17:14.266396626 +0000 UTC m=+55.633632201" watchObservedRunningTime="2025-05-13 07:17:14.306618735 +0000 UTC m=+55.673854190" May 13 07:17:14.310000 audit[4115]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:14.310000 audit[4115]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdf260e020 a2=0 a3=7ffdf260e00c items=0 ppid=2172 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:14.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:14.318000 audit[4115]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:14.318000 audit[4115]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdf260e020 a2=0 a3=7ffdf260e00c items=0 ppid=2172 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:14.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:14.333000 audit[4117]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:14.333000 audit[4117]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd78f9b780 a2=0 a3=7ffd78f9b76c items=0 ppid=2172 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:14.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:14.347000 audit[4117]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4117 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:14.347000 audit[4117]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd78f9b780 a2=0 a3=7ffd78f9b76c items=0 ppid=2172 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:14.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:14.557630 systemd-networkd[987]: cali78bb033f1cc: Gained IPv6LL May 13 07:17:14.798000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:14.798000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0073af5f0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:17:14.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:17:14.798000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:14.798000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0073af650 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:17:14.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:17:14.809000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:14.809000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0073af890 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:17:14.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:17:14.809000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:14.809000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007b9d440 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:17:14.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:17:14.873000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:14.873000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:14.873000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007b9d4a0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:17:14.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:17:14.873000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0073af8c0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:17:14.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:17:14.942833 systemd-networkd[987]: cali7d18a1fdf0e: Gained IPv6LL May 13 07:17:14.989000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:14.989000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026ae780 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:17:14.989000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:17:14.990000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:14.990000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028c4a80 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:17:14.990000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:17:17.031048 env[1159]: time="2025-05-13T07:17:17.031001242Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:17.033397 env[1159]: time="2025-05-13T07:17:17.033373862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:17.035493 env[1159]: time="2025-05-13T07:17:17.035436097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:17.037449 env[1159]: time="2025-05-13T07:17:17.037424313Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:17.038123 env[1159]: time="2025-05-13T07:17:17.038077304Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 13 07:17:17.045274 env[1159]: time="2025-05-13T07:17:17.044448187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 07:17:17.056296 env[1159]: time="2025-05-13T07:17:17.056232319Z" level=info msg="CreateContainer within sandbox \"c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 07:17:17.078983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2545605994.mount: Deactivated successfully. May 13 07:17:17.089910 env[1159]: time="2025-05-13T07:17:17.089855589Z" level=info msg="CreateContainer within sandbox \"c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f\"" May 13 07:17:17.091185 env[1159]: time="2025-05-13T07:17:17.090625450Z" level=info msg="StartContainer for \"50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f\"" May 13 07:17:17.115542 systemd[1]: Started cri-containerd-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f.scope. May 13 07:17:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.217000 audit: BPF prog-id=193 op=LOAD May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3750 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:17.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663438376234643662353630303431366134316635643132393230 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3750 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:17.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663438376234643662353630303431366134316635643132393230 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit: BPF prog-id=194 op=LOAD May 13 07:17:17.220000 audit[4134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024c90 items=0 ppid=3750 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:17.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663438376234643662353630303431366134316635643132393230 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.220000 audit: BPF prog-id=195 op=LOAD May 13 07:17:17.220000 audit[4134]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024cd8 items=0 ppid=3750 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:17.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663438376234643662353630303431366134316635643132393230 May 13 07:17:17.221000 audit: BPF prog-id=195 op=UNLOAD May 13 07:17:17.221000 audit: BPF prog-id=194 op=UNLOAD May 13 07:17:17.221000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { perfmon } for pid=4134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit[4134]: AVC avc: denied { bpf } for pid=4134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:17.221000 audit: BPF prog-id=196 op=LOAD May 13 07:17:17.221000 audit[4134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000250e8 items=0 ppid=3750 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:17.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530663438376234643662353630303431366134316635643132393230 May 13 07:17:17.340032 env[1159]: time="2025-05-13T07:17:17.339933158Z" level=info msg="StartContainer for \"50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f\" returns successfully" May 13 07:17:18.323227 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.PDnsr5.mount: Deactivated successfully. May 13 07:17:18.384952 kubelet[2039]: I0513 07:17:18.384870 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-85bff8447f-wgtt6" podStartSLOduration=32.948238812 podStartE2EDuration="38.384852395s" podCreationTimestamp="2025-05-13 07:16:40 +0000 UTC" firstStartedPulling="2025-05-13 07:17:11.605646191 +0000 UTC m=+52.972881646" lastFinishedPulling="2025-05-13 07:17:17.042259774 +0000 UTC m=+58.409495229" observedRunningTime="2025-05-13 07:17:18.294164338 +0000 UTC m=+59.661399864" watchObservedRunningTime="2025-05-13 07:17:18.384852395 +0000 UTC m=+59.752087870" May 13 07:17:18.882533 env[1159]: time="2025-05-13T07:17:18.882463982Z" level=info msg="StopPodSandbox for \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\"" May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:18.967 [WARNING][4203] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0", GenerateName:"calico-kube-controllers-85bff8447f-", Namespace:"calico-system", SelfLink:"", UID:"ed427429-a83c-40b7-b584-f943deea24bc", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85bff8447f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc", Pod:"calico-kube-controllers-85bff8447f-wgtt6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9e663d72b8e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:18.967 [INFO][4203] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:18.967 [INFO][4203] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" iface="eth0" netns="" May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:18.968 [INFO][4203] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:18.968 [INFO][4203] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:19.015 [INFO][4210] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:19.015 [INFO][4210] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:19.016 [INFO][4210] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:19.023 [WARNING][4210] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:19.023 [INFO][4210] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:19.026 [INFO][4210] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.028368 env[1159]: 2025-05-13 07:17:19.027 [INFO][4203] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:19.028980 env[1159]: time="2025-05-13T07:17:19.028394373Z" level=info msg="TearDown network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\" successfully" May 13 07:17:19.028980 env[1159]: time="2025-05-13T07:17:19.028426965Z" level=info msg="StopPodSandbox for \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\" returns successfully" May 13 07:17:19.029568 env[1159]: time="2025-05-13T07:17:19.029536956Z" level=info msg="RemovePodSandbox for \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\"" May 13 07:17:19.029628 env[1159]: time="2025-05-13T07:17:19.029573705Z" level=info msg="Forcibly stopping sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\"" May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.108 [WARNING][4229] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0", GenerateName:"calico-kube-controllers-85bff8447f-", Namespace:"calico-system", SelfLink:"", UID:"ed427429-a83c-40b7-b584-f943deea24bc", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85bff8447f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"c01974bba88ae6469872ac3c097c69d1dca704bc5cd9dfd77885e817acae2cdc", Pod:"calico-kube-controllers-85bff8447f-wgtt6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9e663d72b8e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.108 [INFO][4229] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.109 [INFO][4229] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" iface="eth0" netns="" May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.109 [INFO][4229] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.109 [INFO][4229] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.150 [INFO][4236] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.157 [INFO][4236] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.157 [INFO][4236] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.173 [WARNING][4236] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.173 [INFO][4236] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" HandleID="k8s-pod-network.e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--kube--controllers--85bff8447f--wgtt6-eth0" May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.175 [INFO][4236] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.177999 env[1159]: 2025-05-13 07:17:19.176 [INFO][4229] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567" May 13 07:17:19.178561 env[1159]: time="2025-05-13T07:17:19.178114862Z" level=info msg="TearDown network for sandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\" successfully" May 13 07:17:19.184193 env[1159]: time="2025-05-13T07:17:19.184135131Z" level=info msg="RemovePodSandbox \"e42bd35c41aeb980793891094ba03aa2d21bc5f5048decf8155c30b0f94af567\" returns successfully" May 13 07:17:19.184799 env[1159]: time="2025-05-13T07:17:19.184770688Z" level=info msg="StopPodSandbox for \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\"" May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.239 [WARNING][4254] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0", GenerateName:"calico-apiserver-c7964b5fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c7964b5fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18", Pod:"calico-apiserver-c7964b5fc-8ngvg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5af977373d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.240 [INFO][4254] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.240 [INFO][4254] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" iface="eth0" netns="" May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.240 [INFO][4254] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.240 [INFO][4254] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.278 [INFO][4262] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.280 [INFO][4262] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.280 [INFO][4262] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.287 [WARNING][4262] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.287 [INFO][4262] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.288 [INFO][4262] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.293403 env[1159]: 2025-05-13 07:17:19.290 [INFO][4254] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:19.294025 env[1159]: time="2025-05-13T07:17:19.293991488Z" level=info msg="TearDown network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\" successfully" May 13 07:17:19.294133 env[1159]: time="2025-05-13T07:17:19.294088751Z" level=info msg="StopPodSandbox for \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\" returns successfully" May 13 07:17:19.295572 env[1159]: time="2025-05-13T07:17:19.295545485Z" level=info msg="RemovePodSandbox for \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\"" May 13 07:17:19.295699 env[1159]: time="2025-05-13T07:17:19.295661503Z" level=info msg="Forcibly stopping sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\"" May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.348 [WARNING][4281] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0", GenerateName:"calico-apiserver-c7964b5fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"1da3d6dd-5b59-49e0-86e9-ebe39f8dc17d", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c7964b5fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18", Pod:"calico-apiserver-c7964b5fc-8ngvg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5af977373d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.348 [INFO][4281] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.349 [INFO][4281] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" iface="eth0" netns="" May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.349 [INFO][4281] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.349 [INFO][4281] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.380 [INFO][4289] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.380 [INFO][4289] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.380 [INFO][4289] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.388 [WARNING][4289] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.388 [INFO][4289] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" HandleID="k8s-pod-network.05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--8ngvg-eth0" May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.389 [INFO][4289] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.392416 env[1159]: 2025-05-13 07:17:19.391 [INFO][4281] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0" May 13 07:17:19.393385 env[1159]: time="2025-05-13T07:17:19.393326394Z" level=info msg="TearDown network for sandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\" successfully" May 13 07:17:19.398352 env[1159]: time="2025-05-13T07:17:19.398312938Z" level=info msg="RemovePodSandbox \"05578d8ffe27683872241e789cbc5468c6d2fe37723f7b0abd21f0598ba566c0\" returns successfully" May 13 07:17:19.399058 env[1159]: time="2025-05-13T07:17:19.399035068Z" level=info msg="StopPodSandbox for \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\"" May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.442 [WARNING][4308] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0", GenerateName:"calico-apiserver-c7964b5fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"53ac7b8b-cefd-4053-8ae9-cd52eaed3172", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c7964b5fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69", Pod:"calico-apiserver-c7964b5fc-gmfjr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali78bb033f1cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.442 [INFO][4308] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.442 [INFO][4308] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" iface="eth0" netns="" May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.442 [INFO][4308] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.442 [INFO][4308] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.479 [INFO][4317] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.479 [INFO][4317] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.479 [INFO][4317] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.487 [WARNING][4317] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.487 [INFO][4317] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.489 [INFO][4317] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.492332 env[1159]: 2025-05-13 07:17:19.490 [INFO][4308] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:19.494321 env[1159]: time="2025-05-13T07:17:19.494284769Z" level=info msg="TearDown network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\" successfully" May 13 07:17:19.494433 env[1159]: time="2025-05-13T07:17:19.494411668Z" level=info msg="StopPodSandbox for \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\" returns successfully" May 13 07:17:19.495022 env[1159]: time="2025-05-13T07:17:19.494989567Z" level=info msg="RemovePodSandbox for \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\"" May 13 07:17:19.495238 env[1159]: time="2025-05-13T07:17:19.495181198Z" level=info msg="Forcibly stopping sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\"" May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.541 [WARNING][4335] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0", GenerateName:"calico-apiserver-c7964b5fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"53ac7b8b-cefd-4053-8ae9-cd52eaed3172", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c7964b5fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69", Pod:"calico-apiserver-c7964b5fc-gmfjr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali78bb033f1cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.542 [INFO][4335] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.542 [INFO][4335] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" iface="eth0" netns="" May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.542 [INFO][4335] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.542 [INFO][4335] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.568 [INFO][4342] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.569 [INFO][4342] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.569 [INFO][4342] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.577 [WARNING][4342] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.577 [INFO][4342] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" HandleID="k8s-pod-network.8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-calico--apiserver--c7964b5fc--gmfjr-eth0" May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.578 [INFO][4342] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.585066 env[1159]: 2025-05-13 07:17:19.580 [INFO][4335] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1" May 13 07:17:19.585066 env[1159]: time="2025-05-13T07:17:19.584817476Z" level=info msg="TearDown network for sandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\" successfully" May 13 07:17:19.589608 env[1159]: time="2025-05-13T07:17:19.589559508Z" level=info msg="RemovePodSandbox \"8a3a3bccd298fa1038843172236258dc57bce5758e0fa798a9d7806179ad9fb1\" returns successfully" May 13 07:17:19.590077 env[1159]: time="2025-05-13T07:17:19.590047698Z" level=info msg="StopPodSandbox for \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\"" May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.639 [WARNING][4361] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"73598660-7840-43c4-995c-6743bc978bfe", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2", Pod:"coredns-7db6d8ff4d-8fqxr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d18a1fdf0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.639 [INFO][4361] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.639 [INFO][4361] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" iface="eth0" netns="" May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.639 [INFO][4361] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.639 [INFO][4361] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.664 [INFO][4368] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.664 [INFO][4368] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.664 [INFO][4368] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.672 [WARNING][4368] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.672 [INFO][4368] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.675 [INFO][4368] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.677623 env[1159]: 2025-05-13 07:17:19.676 [INFO][4361] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:19.678183 env[1159]: time="2025-05-13T07:17:19.677672055Z" level=info msg="TearDown network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\" successfully" May 13 07:17:19.678183 env[1159]: time="2025-05-13T07:17:19.677704176Z" level=info msg="StopPodSandbox for \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\" returns successfully" May 13 07:17:19.678482 env[1159]: time="2025-05-13T07:17:19.678438840Z" level=info msg="RemovePodSandbox for \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\"" May 13 07:17:19.678534 env[1159]: time="2025-05-13T07:17:19.678474678Z" level=info msg="Forcibly stopping sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\"" May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.727 [WARNING][4386] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"73598660-7840-43c4-995c-6743bc978bfe", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"5a992fcb9a7da4a705e1e634a35cbf70a2f9b04bdd993d0c331384cea43686e2", Pod:"coredns-7db6d8ff4d-8fqxr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d18a1fdf0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.728 [INFO][4386] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.728 [INFO][4386] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" iface="eth0" netns="" May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.728 [INFO][4386] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.728 [INFO][4386] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.758 [INFO][4393] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.759 [INFO][4393] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.760 [INFO][4393] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.768 [WARNING][4393] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.769 [INFO][4393] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" HandleID="k8s-pod-network.011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--8fqxr-eth0" May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.770 [INFO][4393] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.773222 env[1159]: 2025-05-13 07:17:19.771 [INFO][4386] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785" May 13 07:17:19.775056 env[1159]: time="2025-05-13T07:17:19.773178351Z" level=info msg="TearDown network for sandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\" successfully" May 13 07:17:19.779800 env[1159]: time="2025-05-13T07:17:19.779767733Z" level=info msg="RemovePodSandbox \"011d02b0bef60d954d0bfd4e340ca819278d385ea73f3326cd2bc938b54ca785\" returns successfully" May 13 07:17:19.780488 env[1159]: time="2025-05-13T07:17:19.780452694Z" level=info msg="StopPodSandbox for \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\"" May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.829 [WARNING][4411] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"3a0bab71-b899-49d4-9090-1fee903ee3ca", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7", Pod:"coredns-7db6d8ff4d-7gcqr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid7addcda960", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.829 [INFO][4411] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.829 [INFO][4411] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" iface="eth0" netns="" May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.829 [INFO][4411] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.829 [INFO][4411] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.856 [INFO][4418] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.856 [INFO][4418] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.856 [INFO][4418] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.866 [WARNING][4418] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.867 [INFO][4418] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.869 [INFO][4418] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.871538 env[1159]: 2025-05-13 07:17:19.870 [INFO][4411] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:19.872166 env[1159]: time="2025-05-13T07:17:19.871567135Z" level=info msg="TearDown network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\" successfully" May 13 07:17:19.872166 env[1159]: time="2025-05-13T07:17:19.871650261Z" level=info msg="StopPodSandbox for \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\" returns successfully" May 13 07:17:19.872766 env[1159]: time="2025-05-13T07:17:19.872738361Z" level=info msg="RemovePodSandbox for \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\"" May 13 07:17:19.872887 env[1159]: time="2025-05-13T07:17:19.872782865Z" level=info msg="Forcibly stopping sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\"" May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.926 [WARNING][4436] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"3a0bab71-b899-49d4-9090-1fee903ee3ca", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"3f8b309d17f183b31e638c29670738e92d85426863ca35dea0ec18392a3db7b7", Pod:"coredns-7db6d8ff4d-7gcqr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid7addcda960", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.926 [INFO][4436] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.926 [INFO][4436] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" iface="eth0" netns="" May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.926 [INFO][4436] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.926 [INFO][4436] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.956 [INFO][4443] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.956 [INFO][4443] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.956 [INFO][4443] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.964 [WARNING][4443] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.964 [INFO][4443] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" HandleID="k8s-pod-network.b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-coredns--7db6d8ff4d--7gcqr-eth0" May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.966 [INFO][4443] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:19.969494 env[1159]: 2025-05-13 07:17:19.968 [INFO][4436] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725" May 13 07:17:19.970226 env[1159]: time="2025-05-13T07:17:19.969520680Z" level=info msg="TearDown network for sandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\" successfully" May 13 07:17:19.975365 env[1159]: time="2025-05-13T07:17:19.975300658Z" level=info msg="RemovePodSandbox \"b97bae300fcadb252ec41a7eeebfd9e5d37b7d7b4c55ef99d1c28f0d446e2725\" returns successfully" May 13 07:17:19.975953 env[1159]: time="2025-05-13T07:17:19.975924633Z" level=info msg="StopPodSandbox for \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\"" May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.026 [WARNING][4462] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"86f7d333-22c4-4d19-b6ba-f4cf43ce1598", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113", Pod:"csi-node-driver-ncrlc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif391510a370", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.026 [INFO][4462] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.026 [INFO][4462] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" iface="eth0" netns="" May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.026 [INFO][4462] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.026 [INFO][4462] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.060 [INFO][4469] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.061 [INFO][4469] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.061 [INFO][4469] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.075 [WARNING][4469] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.075 [INFO][4469] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.077 [INFO][4469] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:20.079424 env[1159]: 2025-05-13 07:17:20.078 [INFO][4462] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:20.079424 env[1159]: time="2025-05-13T07:17:20.079338679Z" level=info msg="TearDown network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\" successfully" May 13 07:17:20.079424 env[1159]: time="2025-05-13T07:17:20.079367444Z" level=info msg="StopPodSandbox for \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\" returns successfully" May 13 07:17:20.081745 env[1159]: time="2025-05-13T07:17:20.081559933Z" level=info msg="RemovePodSandbox for \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\"" May 13 07:17:20.081745 env[1159]: time="2025-05-13T07:17:20.081588757Z" level=info msg="Forcibly stopping sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\"" May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.157 [WARNING][4491] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"86f7d333-22c4-4d19-b6ba-f4cf43ce1598", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 7, 16, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1a4ba3031a.novalocal", ContainerID:"755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113", Pod:"csi-node-driver-ncrlc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif391510a370", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.157 [INFO][4491] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.157 [INFO][4491] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" iface="eth0" netns="" May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.157 [INFO][4491] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.158 [INFO][4491] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.197 [INFO][4498] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.197 [INFO][4498] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.197 [INFO][4498] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.212 [WARNING][4498] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.212 [INFO][4498] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" HandleID="k8s-pod-network.2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" Workload="ci--3510--3--7--n--1a4ba3031a.novalocal-k8s-csi--node--driver--ncrlc-eth0" May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.217 [INFO][4498] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 07:17:20.220509 env[1159]: 2025-05-13 07:17:20.219 [INFO][4491] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d" May 13 07:17:20.221215 env[1159]: time="2025-05-13T07:17:20.220548749Z" level=info msg="TearDown network for sandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\" successfully" May 13 07:17:20.225226 env[1159]: time="2025-05-13T07:17:20.225188890Z" level=info msg="RemovePodSandbox \"2f9e1084458021c29cd1b0419cbe97828afcc1f5caf193b18ac12a76d61c4c3d\" returns successfully" May 13 07:17:23.032227 env[1159]: time="2025-05-13T07:17:23.032120258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:23.036538 env[1159]: time="2025-05-13T07:17:23.036470490Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:23.039553 env[1159]: time="2025-05-13T07:17:23.039496978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:23.042325 env[1159]: time="2025-05-13T07:17:23.042233021Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:23.043286 env[1159]: time="2025-05-13T07:17:23.043165567Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 07:17:23.049673 env[1159]: time="2025-05-13T07:17:23.049606655Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 07:17:23.054290 env[1159]: time="2025-05-13T07:17:23.053871215Z" level=info msg="CreateContainer within sandbox \"4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 07:17:23.072917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount25503796.mount: Deactivated successfully. May 13 07:17:23.080723 env[1159]: time="2025-05-13T07:17:23.080665528Z" level=info msg="CreateContainer within sandbox \"4facc6ab2caf67486c145d976b7d02d72d1af125b94c274d5d863e8eecb89c18\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4c19813e4158a4a1a6bc05756b220eb36f50eefc7d4218dfd3d7e96ac9e22864\"" May 13 07:17:23.086897 env[1159]: time="2025-05-13T07:17:23.086869460Z" level=info msg="StartContainer for \"4c19813e4158a4a1a6bc05756b220eb36f50eefc7d4218dfd3d7e96ac9e22864\"" May 13 07:17:23.140036 systemd[1]: Started cri-containerd-4c19813e4158a4a1a6bc05756b220eb36f50eefc7d4218dfd3d7e96ac9e22864.scope. May 13 07:17:23.167350 kernel: kauditd_printk_skb: 260 callbacks suppressed May 13 07:17:23.167461 kernel: audit: type=1400 audit(1747120643.155:1245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.167494 kernel: audit: type=1400 audit(1747120643.155:1246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.171984 kernel: audit: type=1400 audit(1747120643.160:1247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.176563 kernel: audit: type=1400 audit(1747120643.160:1248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.181358 kernel: audit: type=1400 audit(1747120643.160:1249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.195794 kernel: audit: type=1400 audit(1747120643.160:1250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.195874 kernel: audit: type=1400 audit(1747120643.160:1251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.195902 kernel: audit: type=1400 audit(1747120643.160:1252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.195932 kernel: audit: type=1400 audit(1747120643.160:1253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.205190 kernel: audit: type=1400 audit(1747120643.166:1254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit: BPF prog-id=197 op=LOAD May 13 07:17:23.166000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3795 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:23.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313938313365343135386134613161366263303537353662323230 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3795 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:23.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313938313365343135386134613161366263303537353662323230 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.166000 audit: BPF prog-id=198 op=LOAD May 13 07:17:23.166000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a45f0 items=0 ppid=3795 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:23.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313938313365343135386134613161366263303537353662323230 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.170000 audit: BPF prog-id=199 op=LOAD May 13 07:17:23.170000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a4638 items=0 ppid=3795 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:23.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313938313365343135386134613161366263303537353662323230 May 13 07:17:23.175000 audit: BPF prog-id=199 op=UNLOAD May 13 07:17:23.175000 audit: BPF prog-id=198 op=UNLOAD May 13 07:17:23.175000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:23.175000 audit: BPF prog-id=200 op=LOAD May 13 07:17:23.175000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a4a48 items=0 ppid=3795 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:23.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313938313365343135386134613161366263303537353662323230 May 13 07:17:23.329703 env[1159]: time="2025-05-13T07:17:23.329562215Z" level=info msg="StartContainer for \"4c19813e4158a4a1a6bc05756b220eb36f50eefc7d4218dfd3d7e96ac9e22864\" returns successfully" May 13 07:17:24.068428 systemd[1]: run-containerd-runc-k8s.io-4c19813e4158a4a1a6bc05756b220eb36f50eefc7d4218dfd3d7e96ac9e22864-runc.1kRuXe.mount: Deactivated successfully. May 13 07:17:24.363000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:17:24.363000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a46660 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:17:24.363000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:17:24.408000 audit[4571]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:24.408000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc7444aac0 a2=0 a3=7ffc7444aaac items=0 ppid=2172 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:24.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:24.412000 audit[4571]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:24.412000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc7444aac0 a2=0 a3=7ffc7444aaac items=0 ppid=2172 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:24.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:25.681763 env[1159]: time="2025-05-13T07:17:25.681712870Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:25.684767 env[1159]: time="2025-05-13T07:17:25.684720854Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:25.687466 env[1159]: time="2025-05-13T07:17:25.687427018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:25.690412 env[1159]: time="2025-05-13T07:17:25.690381340Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:25.691425 env[1159]: time="2025-05-13T07:17:25.690942556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 07:17:25.693606 env[1159]: time="2025-05-13T07:17:25.693132520Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 07:17:25.696400 env[1159]: time="2025-05-13T07:17:25.696353443Z" level=info msg="CreateContainer within sandbox \"755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 07:17:25.726953 env[1159]: time="2025-05-13T07:17:25.726900082Z" level=info msg="CreateContainer within sandbox \"755d86f9413ab908c5602ba293dce8bd720715cb1e125944a95fa2639b2b3113\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"593adcd932705617e96a44705475dd73b95408d2344066e05b320c8e1d24e4e6\"" May 13 07:17:25.727682 env[1159]: time="2025-05-13T07:17:25.727652980Z" level=info msg="StartContainer for \"593adcd932705617e96a44705475dd73b95408d2344066e05b320c8e1d24e4e6\"" May 13 07:17:25.782458 systemd[1]: run-containerd-runc-k8s.io-593adcd932705617e96a44705475dd73b95408d2344066e05b320c8e1d24e4e6-runc.fPEDUH.mount: Deactivated successfully. May 13 07:17:25.790113 systemd[1]: Started cri-containerd-593adcd932705617e96a44705475dd73b95408d2344066e05b320c8e1d24e4e6.scope. May 13 07:17:25.819000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.819000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff9467722f8 items=0 ppid=3526 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:25.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336164636439333237303536313765393661343437303534373564 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.820000 audit: BPF prog-id=201 op=LOAD May 13 07:17:25.820000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000249f8 items=0 ppid=3526 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:25.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336164636439333237303536313765393661343437303534373564 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.821000 audit: BPF prog-id=202 op=LOAD May 13 07:17:25.821000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024a48 items=0 ppid=3526 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:25.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336164636439333237303536313765393661343437303534373564 May 13 07:17:25.822000 audit: BPF prog-id=202 op=UNLOAD May 13 07:17:25.822000 audit: BPF prog-id=201 op=UNLOAD May 13 07:17:25.822000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:25.822000 audit: BPF prog-id=203 op=LOAD May 13 07:17:25.822000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024ad8 items=0 ppid=3526 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:25.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336164636439333237303536313765393661343437303534373564 May 13 07:17:25.846885 env[1159]: time="2025-05-13T07:17:25.846839065Z" level=info msg="StartContainer for \"593adcd932705617e96a44705475dd73b95408d2344066e05b320c8e1d24e4e6\" returns successfully" May 13 07:17:26.050528 kubelet[2039]: I0513 07:17:26.050321 2039 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 07:17:26.050528 kubelet[2039]: I0513 07:17:26.050407 2039 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 07:17:26.214232 env[1159]: time="2025-05-13T07:17:26.214162343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:26.218064 env[1159]: time="2025-05-13T07:17:26.218018713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:26.220496 env[1159]: time="2025-05-13T07:17:26.220456862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:26.222990 env[1159]: time="2025-05-13T07:17:26.222937882Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 07:17:26.224123 env[1159]: time="2025-05-13T07:17:26.224082237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 07:17:26.227622 env[1159]: time="2025-05-13T07:17:26.227572558Z" level=info msg="CreateContainer within sandbox \"514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 07:17:26.249144 env[1159]: time="2025-05-13T07:17:26.249088711Z" level=info msg="CreateContainer within sandbox \"514f507214a4fa57b12ac21731da6b64a4f15868ef62b6f0957b4583687e1f69\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0883e2b806e94857eef22201fae47f2b2aad32ade424b7a3ee32114fcdd4b806\"" May 13 07:17:26.250011 env[1159]: time="2025-05-13T07:17:26.249968217Z" level=info msg="StartContainer for \"0883e2b806e94857eef22201fae47f2b2aad32ade424b7a3ee32114fcdd4b806\"" May 13 07:17:26.269201 systemd[1]: Started cri-containerd-0883e2b806e94857eef22201fae47f2b2aad32ade424b7a3ee32114fcdd4b806.scope. May 13 07:17:26.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.309000 audit: BPF prog-id=204 op=LOAD May 13 07:17:26.311000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3989 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:26.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383365326238303665393438353765656632323230316661653437 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3989 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:26.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383365326238303665393438353765656632323230316661653437 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.311000 audit: BPF prog-id=205 op=LOAD May 13 07:17:26.311000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001fe660 items=0 ppid=3989 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:26.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383365326238303665393438353765656632323230316661653437 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.313000 audit: BPF prog-id=206 op=LOAD May 13 07:17:26.313000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001fe6a8 items=0 ppid=3989 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:26.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383365326238303665393438353765656632323230316661653437 May 13 07:17:26.314000 audit: BPF prog-id=206 op=UNLOAD May 13 07:17:26.314000 audit: BPF prog-id=205 op=UNLOAD May 13 07:17:26.314000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { perfmon } for pid=4623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit[4623]: AVC avc: denied { bpf } for pid=4623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 07:17:26.314000 audit: BPF prog-id=207 op=LOAD May 13 07:17:26.314000 audit[4623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001feab8 items=0 ppid=3989 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:26.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383365326238303665393438353765656632323230316661653437 May 13 07:17:26.376042 kubelet[2039]: I0513 07:17:26.375944 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c7964b5fc-8ngvg" podStartSLOduration=35.978782125 podStartE2EDuration="47.375871359s" podCreationTimestamp="2025-05-13 07:16:39 +0000 UTC" firstStartedPulling="2025-05-13 07:17:11.651540031 +0000 UTC m=+53.018775486" lastFinishedPulling="2025-05-13 07:17:23.048629255 +0000 UTC m=+64.415864720" observedRunningTime="2025-05-13 07:17:24.373080203 +0000 UTC m=+65.740315668" watchObservedRunningTime="2025-05-13 07:17:26.375871359 +0000 UTC m=+67.743106834" May 13 07:17:26.376365 kubelet[2039]: I0513 07:17:26.376307 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ncrlc" podStartSLOduration=31.179106288 podStartE2EDuration="46.376300437s" podCreationTimestamp="2025-05-13 07:16:40 +0000 UTC" firstStartedPulling="2025-05-13 07:17:10.495670025 +0000 UTC m=+51.862905490" lastFinishedPulling="2025-05-13 07:17:25.692864174 +0000 UTC m=+67.060099639" observedRunningTime="2025-05-13 07:17:26.375651936 +0000 UTC m=+67.742887411" watchObservedRunningTime="2025-05-13 07:17:26.376300437 +0000 UTC m=+67.743535912" May 13 07:17:26.383841 env[1159]: time="2025-05-13T07:17:26.383776370Z" level=info msg="StartContainer for \"0883e2b806e94857eef22201fae47f2b2aad32ade424b7a3ee32114fcdd4b806\" returns successfully" May 13 07:17:27.006868 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.khQggo.mount: Deactivated successfully. May 13 07:17:27.388144 kubelet[2039]: I0513 07:17:27.388046 2039 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c7964b5fc-gmfjr" podStartSLOduration=35.774019245 podStartE2EDuration="48.388019271s" podCreationTimestamp="2025-05-13 07:16:39 +0000 UTC" firstStartedPulling="2025-05-13 07:17:13.611536238 +0000 UTC m=+54.978771693" lastFinishedPulling="2025-05-13 07:17:26.225536254 +0000 UTC m=+67.592771719" observedRunningTime="2025-05-13 07:17:27.386425681 +0000 UTC m=+68.753661146" watchObservedRunningTime="2025-05-13 07:17:27.388019271 +0000 UTC m=+68.755254736" May 13 07:17:27.429000 audit[4673]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:27.429000 audit[4673]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd0372b2a0 a2=0 a3=7ffd0372b28c items=0 ppid=2172 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:27.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:27.438000 audit[4673]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:27.438000 audit[4673]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd0372b2a0 a2=0 a3=7ffd0372b28c items=0 ppid=2172 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:27.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:28.162000 audit[4634]: AVC avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:17:28.165763 kernel: kauditd_printk_skb: 162 callbacks suppressed May 13 07:17:28.165823 kernel: audit: type=1400 audit(1747120648.162:1292): avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:17:28.162000 audit[4634]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014ad900 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:17:28.183276 kernel: audit: type=1300 audit(1747120648.162:1292): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014ad900 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:17:28.162000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:17:28.192311 kernel: audit: type=1327 audit(1747120648.162:1292): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:17:28.230000 audit[4675]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:28.230000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd7c7d6ce0 a2=0 a3=7ffd7c7d6ccc items=0 ppid=2172 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:28.243291 kernel: audit: type=1325 audit(1747120648.230:1293): table=filter:117 family=2 entries=9 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:28.243354 kernel: audit: type=1300 audit(1747120648.230:1293): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd7c7d6ce0 a2=0 a3=7ffd7c7d6ccc items=0 ppid=2172 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:28.243381 kernel: audit: type=1327 audit(1747120648.230:1293): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:28.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:28.248000 audit[4675]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:28.254269 kernel: audit: type=1325 audit(1747120648.248:1294): table=nat:118 family=2 entries=27 op=nft_register_chain pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:28.248000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd7c7d6ce0 a2=0 a3=7ffd7c7d6ccc items=0 ppid=2172 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:28.265280 kernel: audit: type=1300 audit(1747120648.248:1294): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd7c7d6ce0 a2=0 a3=7ffd7c7d6ccc items=0 ppid=2172 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:28.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:28.273278 kernel: audit: type=1327 audit(1747120648.248:1294): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:29.994000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:30.010356 kernel: audit: type=1400 audit(1747120649.994:1295): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:29.994000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003243300 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:17:29.994000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:17:30.020000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:30.020000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031f79c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:17:30.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:17:30.021000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:30.021000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031f79e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:17:30.021000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:17:30.024000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:17:30.024000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031f7a00 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:17:30.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:17:37.994338 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.JJBIU2.mount: Deactivated successfully. May 13 07:17:50.295492 kubelet[2039]: I0513 07:17:50.294955 2039 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 07:17:50.413000 audit[4715]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:50.416848 kernel: kauditd_printk_skb: 11 callbacks suppressed May 13 07:17:50.417011 kernel: audit: type=1325 audit(1747120670.413:1299): table=filter:119 family=2 entries=8 op=nft_register_rule pid=4715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:50.413000 audit[4715]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff6712d340 a2=0 a3=7fff6712d32c items=0 ppid=2172 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:50.427908 kernel: audit: type=1300 audit(1747120670.413:1299): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff6712d340 a2=0 a3=7fff6712d32c items=0 ppid=2172 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:50.427996 kernel: audit: type=1327 audit(1747120670.413:1299): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:50.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:50.433000 audit[4715]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:50.433000 audit[4715]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff6712d340 a2=0 a3=7fff6712d32c items=0 ppid=2172 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:50.446333 kernel: audit: type=1325 audit(1747120670.433:1300): table=nat:120 family=2 entries=34 op=nft_register_chain pid=4715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:17:50.446406 kernel: audit: type=1300 audit(1747120670.433:1300): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff6712d340 a2=0 a3=7fff6712d32c items=0 ppid=2172 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:17:50.446448 kernel: audit: type=1327 audit(1747120670.433:1300): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:50.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:17:53.934035 systemd[1]: run-containerd-runc-k8s.io-ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7-runc.7cfjBd.mount: Deactivated successfully. May 13 07:17:57.015862 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.kx8GJ2.mount: Deactivated successfully. May 13 07:18:14.798000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.807273 kernel: audit: type=1400 audit(1747120694.798:1302): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.798000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.815272 kernel: audit: type=1400 audit(1747120694.798:1301): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.798000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ef836e0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.825279 kernel: audit: type=1300 audit(1747120694.798:1301): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ef836e0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.837282 kernel: audit: type=1327 audit(1747120694.798:1301): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.798000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0116731d0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.847299 kernel: audit: type=1300 audit(1747120694.798:1302): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0116731d0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.813000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.863535 kernel: audit: type=1327 audit(1747120694.798:1302): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.863808 kernel: audit: type=1400 audit(1747120694.813:1303): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.863954 kernel: audit: type=1300 audit(1747120694.813:1303): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ef83860 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.813000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ef83860 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.813000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.891396 kernel: audit: type=1327 audit(1747120694.813:1303): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.891700 kernel: audit: type=1400 audit(1747120694.813:1304): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.813000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00d2d8b60 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.872000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.872000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d2d8fe0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.872000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.872000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.872000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ef83ce0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:18:14.872000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:18:14.990000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.991000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:14.991000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce15e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:14.991000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:14.990000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c578c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:14.990000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:23.949229 systemd[1]: run-containerd-runc-k8s.io-ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7-runc.Z2ntfh.mount: Deactivated successfully. May 13 07:18:24.388000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:18:24.392988 kernel: kauditd_printk_skb: 14 callbacks suppressed May 13 07:18:24.393434 kernel: audit: type=1400 audit(1747120704.388:1309): avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:18:24.388000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ac18a0 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:18:24.388000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:18:24.443509 kernel: audit: type=1300 audit(1747120704.388:1309): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ac18a0 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:18:24.443719 kernel: audit: type=1327 audit(1747120704.388:1309): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:18:27.036061 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.cSyK1K.mount: Deactivated successfully. May 13 07:18:28.163000 audit[4634]: AVC avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:18:28.163000 audit[4634]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c09a20 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:18:28.200054 kernel: audit: type=1400 audit(1747120708.163:1310): avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:18:28.200322 kernel: audit: type=1300 audit(1747120708.163:1310): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c09a20 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:18:28.163000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:18:28.225309 kernel: audit: type=1327 audit(1747120708.163:1310): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:18:30.002000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:30.002000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d57ee0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:30.035805 kernel: audit: type=1400 audit(1747120710.002:1311): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:30.036073 kernel: audit: type=1300 audit(1747120710.002:1311): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d57ee0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:30.036174 kernel: audit: type=1327 audit(1747120710.002:1311): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:30.002000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:30.022000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:30.065594 kernel: audit: type=1400 audit(1747120710.022:1312): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:30.065786 kernel: audit: type=1300 audit(1747120710.022:1312): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001057400 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:30.022000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001057400 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:30.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:30.086431 kernel: audit: type=1327 audit(1747120710.022:1312): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:30.086622 kernel: audit: type=1400 audit(1747120710.022:1313): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:30.022000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:30.092311 kernel: audit: type=1300 audit(1747120710.022:1313): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001057900 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:30.022000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001057900 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:30.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:30.106344 kernel: audit: type=1327 audit(1747120710.022:1313): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:30.106525 kernel: audit: type=1400 audit(1747120710.022:1314): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:30.022000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:18:30.022000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001057b00 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:18:30.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:18:37.991109 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.HZAMfq.mount: Deactivated successfully. May 13 07:18:53.948507 systemd[1]: run-containerd-runc-k8s.io-ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7-runc.3rrwUl.mount: Deactivated successfully. May 13 07:18:57.028735 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.HKrOM1.mount: Deactivated successfully. May 13 07:19:14.800000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.805126 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 07:19:14.805365 kernel: audit: type=1400 audit(1747120754.800:1315): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.800000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.834162 kernel: audit: type=1400 audit(1747120754.800:1316): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.834476 kernel: audit: type=1300 audit(1747120754.800:1316): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00185f0b0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.800000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00185f0b0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.867842 kernel: audit: type=1327 audit(1747120754.800:1316): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.800000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0025c9e30 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.883605 kernel: audit: type=1300 audit(1747120754.800:1315): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0025c9e30 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.890448 kernel: audit: type=1327 audit(1747120754.800:1315): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.890662 kernel: audit: type=1400 audit(1747120754.814:1317): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.814000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.896292 kernel: audit: type=1300 audit(1747120754.814:1317): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c010a397e0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.814000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c010a397e0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.911500 kernel: audit: type=1327 audit(1747120754.814:1317): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.911689 kernel: audit: type=1400 audit(1747120754.815:1318): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.815000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.815000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0025c9ec0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.875000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.875000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00185fd70 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.875000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.882000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.882000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c010a39960 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:19:14.882000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:19:14.992000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.992000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a7d920 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:14.992000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:14.992000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:14.992000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c141a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:14.992000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:24.398000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:19:24.403219 kernel: kauditd_printk_skb: 14 callbacks suppressed May 13 07:19:24.403386 kernel: audit: type=1400 audit(1747120764.398:1323): avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:19:24.398000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00256c500 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:19:24.398000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:19:24.462406 kernel: audit: type=1300 audit(1747120764.398:1323): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00256c500 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:19:24.462742 kernel: audit: type=1327 audit(1747120764.398:1323): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:19:27.034594 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.EiDMqC.mount: Deactivated successfully. May 13 07:19:28.165000 audit[4634]: AVC avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:19:28.165000 audit[4634]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00157ea80 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:19:28.202311 kernel: audit: type=1400 audit(1747120768.165:1324): avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:19:28.202674 kernel: audit: type=1300 audit(1747120768.165:1324): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00157ea80 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:19:28.202785 kernel: audit: type=1327 audit(1747120768.165:1324): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:19:28.165000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:19:30.005000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:30.005000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e94560 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:30.039915 kernel: audit: type=1400 audit(1747120770.005:1325): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:30.040133 kernel: audit: type=1300 audit(1747120770.005:1325): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e94560 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:30.040205 kernel: audit: type=1327 audit(1747120770.005:1325): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:30.005000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:30.023000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:30.071424 kernel: audit: type=1400 audit(1747120770.023:1326): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:30.071622 kernel: audit: type=1300 audit(1747120770.023:1326): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e94580 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:30.023000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e94580 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:30.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:30.091547 kernel: audit: type=1327 audit(1747120770.023:1326): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:30.025000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:30.097862 kernel: audit: type=1400 audit(1747120770.025:1327): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:30.025000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000deb440 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:30.105757 kernel: audit: type=1300 audit(1747120770.025:1327): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000deb440 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:30.105989 kernel: audit: type=1327 audit(1747120770.025:1327): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:30.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:30.112300 kernel: audit: type=1400 audit(1747120770.027:1328): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:30.027000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:19:30.027000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e945a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:19:30.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:19:37.985901 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.kzYO8P.mount: Deactivated successfully. May 13 07:19:57.055703 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.9Yhk6I.mount: Deactivated successfully. May 13 07:20:14.803000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.816587 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 07:20:14.816710 kernel: audit: type=1400 audit(1747120814.803:1329): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.803000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c011580000 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.848081 kernel: audit: type=1300 audit(1747120814.803:1329): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c011580000 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.848178 kernel: audit: type=1327 audit(1747120814.803:1329): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.808000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.876673 kernel: audit: type=1400 audit(1747120814.808:1330): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.876755 kernel: audit: type=1300 audit(1747120814.808:1330): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c011580390 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.808000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c011580390 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.893309 kernel: audit: type=1327 audit(1747120814.808:1330): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.893379 kernel: audit: type=1400 audit(1747120814.815:1331): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.815000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.815000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00dfea7e0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.906801 kernel: audit: type=1300 audit(1747120814.815:1331): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00dfea7e0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.906902 kernel: audit: type=1327 audit(1747120814.815:1331): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.816000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.919339 kernel: audit: type=1400 audit(1747120814.816:1332): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.816000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c011580420 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.876000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.876000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c010bb49c0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.876000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.882000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.882000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00df00560 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:20:14.882000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:20:14.993000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.993000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00368df50 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:14.993000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:14.994000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:14.994000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00345af60 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:14.994000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:17.652675 systemd[1]: Started sshd@9-172.24.4.235:22-172.24.4.1:60560.service. May 13 07:20:17.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.235:22-172.24.4.1:60560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:18.915822 sshd[5030]: Accepted publickey for core from 172.24.4.1 port 60560 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:20:18.914000 audit[5030]: USER_ACCT pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:18.915000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:18.915000 audit[5030]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2d05e340 a2=3 a3=0 items=0 ppid=1 pid=5030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:18.915000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:20:18.918503 sshd[5030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:20:18.927002 systemd-logind[1146]: New session 10 of user core. May 13 07:20:18.927779 systemd[1]: Started session-10.scope. May 13 07:20:18.935000 audit[5030]: USER_START pid=5030 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:18.937000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:19.883114 sshd[5030]: pam_unix(sshd:session): session closed for user core May 13 07:20:19.905320 kernel: kauditd_printk_skb: 22 callbacks suppressed May 13 07:20:19.905564 kernel: audit: type=1106 audit(1747120819.886:1343): pid=5030 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:19.886000 audit[5030]: USER_END pid=5030 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:19.913176 systemd[1]: sshd@9-172.24.4.235:22-172.24.4.1:60560.service: Deactivated successfully. May 13 07:20:19.916374 systemd[1]: session-10.scope: Deactivated successfully. May 13 07:20:19.923491 kernel: audit: type=1104 audit(1747120819.886:1344): pid=5030 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:19.886000 audit[5030]: CRED_DISP pid=5030 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:19.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.235:22-172.24.4.1:60560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:19.930508 kernel: audit: type=1131 audit(1747120819.912:1345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.235:22-172.24.4.1:60560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:19.929865 systemd-logind[1146]: Session 10 logged out. Waiting for processes to exit. May 13 07:20:19.931720 systemd-logind[1146]: Removed session 10. May 13 07:20:24.401000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:20:24.401000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00086e000 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:20:24.438366 kernel: audit: type=1400 audit(1747120824.401:1346): avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:20:24.438585 kernel: audit: type=1300 audit(1747120824.401:1346): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00086e000 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:20:24.438672 kernel: audit: type=1327 audit(1747120824.401:1346): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:20:24.401000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:20:24.895684 systemd[1]: Started sshd@10-172.24.4.235:22-172.24.4.1:44990.service. May 13 07:20:24.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.235:22-172.24.4.1:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:24.917329 kernel: audit: type=1130 audit(1747120824.902:1347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.235:22-172.24.4.1:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:26.198000 audit[5080]: USER_ACCT pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:26.200613 sshd[5080]: Accepted publickey for core from 172.24.4.1 port 44990 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:20:26.215300 kernel: audit: type=1101 audit(1747120826.198:1348): pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:26.214000 audit[5080]: CRED_ACQ pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:26.217011 sshd[5080]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:20:26.233499 kernel: audit: type=1103 audit(1747120826.214:1349): pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:26.248315 kernel: audit: type=1006 audit(1747120826.214:1350): pid=5080 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 13 07:20:26.214000 audit[5080]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd51613d90 a2=3 a3=0 items=0 ppid=1 pid=5080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:26.265327 kernel: audit: type=1300 audit(1747120826.214:1350): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd51613d90 a2=3 a3=0 items=0 ppid=1 pid=5080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:26.267380 systemd-logind[1146]: New session 11 of user core. May 13 07:20:26.276672 kernel: audit: type=1327 audit(1747120826.214:1350): proctitle=737368643A20636F7265205B707269765D May 13 07:20:26.214000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:20:26.277192 systemd[1]: Started session-11.scope. May 13 07:20:26.292000 audit[5080]: USER_START pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:26.302795 kernel: audit: type=1105 audit(1747120826.292:1351): pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:26.302948 kernel: audit: type=1103 audit(1747120826.301:1352): pid=5082 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:26.301000 audit[5082]: CRED_ACQ pid=5082 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:26.976348 sshd[5080]: pam_unix(sshd:session): session closed for user core May 13 07:20:26.977000 audit[5080]: USER_END pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:27.000321 kernel: audit: type=1106 audit(1747120826.977:1353): pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:27.000819 systemd[1]: sshd@10-172.24.4.235:22-172.24.4.1:44990.service: Deactivated successfully. May 13 07:20:27.004085 systemd[1]: session-11.scope: Deactivated successfully. May 13 07:20:26.977000 audit[5080]: CRED_DISP pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:27.023505 kernel: audit: type=1104 audit(1747120826.977:1354): pid=5080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:27.024484 systemd-logind[1146]: Session 11 logged out. Waiting for processes to exit. May 13 07:20:27.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.235:22-172.24.4.1:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:27.028827 systemd-logind[1146]: Removed session 11. May 13 07:20:27.058971 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.Vrad9l.mount: Deactivated successfully. May 13 07:20:28.167000 audit[4634]: AVC avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:20:28.167000 audit[4634]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001456740 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:20:28.167000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:20:30.012885 kernel: kauditd_printk_skb: 4 callbacks suppressed May 13 07:20:30.013644 kernel: audit: type=1400 audit(1747120830.009:1357): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:30.009000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:30.009000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000428aa0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:30.025844 kernel: audit: type=1300 audit(1747120830.009:1357): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000428aa0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:30.025984 kernel: audit: type=1327 audit(1747120830.009:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:30.009000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:30.032335 kernel: audit: type=1400 audit(1747120830.024:1358): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:30.024000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:30.024000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001057840 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:30.054843 kernel: audit: type=1300 audit(1747120830.024:1358): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001057840 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:30.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:30.070758 kernel: audit: type=1327 audit(1747120830.024:1358): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:30.024000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:30.086551 kernel: audit: type=1400 audit(1747120830.024:1359): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:30.024000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000428ba0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:30.095965 kernel: audit: type=1300 audit(1747120830.024:1359): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000428ba0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:30.096069 kernel: audit: type=1327 audit(1747120830.024:1359): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:30.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:30.024000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:30.108678 kernel: audit: type=1400 audit(1747120830.024:1360): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:20:30.024000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001057860 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:20:30.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:20:31.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.235:22-172.24.4.1:45006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:31.992806 systemd[1]: Started sshd@11-172.24.4.235:22-172.24.4.1:45006.service. May 13 07:20:33.207000 audit[5111]: USER_ACCT pid=5111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:33.209584 sshd[5111]: Accepted publickey for core from 172.24.4.1 port 45006 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:20:33.211000 audit[5111]: CRED_ACQ pid=5111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:33.211000 audit[5111]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8560f6b0 a2=3 a3=0 items=0 ppid=1 pid=5111 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:33.211000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:20:33.215054 sshd[5111]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:20:33.228141 systemd-logind[1146]: New session 12 of user core. May 13 07:20:33.233598 systemd[1]: Started session-12.scope. May 13 07:20:33.248000 audit[5111]: USER_START pid=5111 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:33.252000 audit[5113]: CRED_ACQ pid=5113 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:33.991190 sshd[5111]: pam_unix(sshd:session): session closed for user core May 13 07:20:33.992000 audit[5111]: USER_END pid=5111 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:33.992000 audit[5111]: CRED_DISP pid=5111 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:33.996499 systemd[1]: sshd@11-172.24.4.235:22-172.24.4.1:45006.service: Deactivated successfully. May 13 07:20:33.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.235:22-172.24.4.1:45006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:33.998181 systemd[1]: session-12.scope: Deactivated successfully. May 13 07:20:33.999918 systemd-logind[1146]: Session 12 logged out. Waiting for processes to exit. May 13 07:20:34.003192 systemd-logind[1146]: Removed session 12. May 13 07:20:37.993381 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.be6Z8c.mount: Deactivated successfully. May 13 07:20:39.012843 systemd[1]: Started sshd@12-172.24.4.235:22-172.24.4.1:41508.service. May 13 07:20:39.024789 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 07:20:39.024938 kernel: audit: type=1130 audit(1747120839.013:1370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.235:22-172.24.4.1:41508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:39.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.235:22-172.24.4.1:41508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:40.432000 audit[5144]: USER_ACCT pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:40.434343 sshd[5144]: Accepted publickey for core from 172.24.4.1 port 41508 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:20:40.449298 kernel: audit: type=1101 audit(1747120840.432:1371): pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:40.450000 audit[5144]: CRED_ACQ pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:40.454059 sshd[5144]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:20:40.467422 kernel: audit: type=1103 audit(1747120840.450:1372): pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:40.478894 kernel: audit: type=1006 audit(1747120840.451:1373): pid=5144 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 13 07:20:40.479972 kernel: audit: type=1300 audit(1747120840.451:1373): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff787c9910 a2=3 a3=0 items=0 ppid=1 pid=5144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:40.451000 audit[5144]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff787c9910 a2=3 a3=0 items=0 ppid=1 pid=5144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:40.481632 systemd[1]: Started session-13.scope. May 13 07:20:40.484735 systemd-logind[1146]: New session 13 of user core. May 13 07:20:40.451000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:20:40.493282 kernel: audit: type=1327 audit(1747120840.451:1373): proctitle=737368643A20636F7265205B707269765D May 13 07:20:40.496000 audit[5144]: USER_START pid=5144 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:40.498000 audit[5146]: CRED_ACQ pid=5146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:40.514468 kernel: audit: type=1105 audit(1747120840.496:1374): pid=5144 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:40.514574 kernel: audit: type=1103 audit(1747120840.498:1375): pid=5146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:41.238298 sshd[5144]: pam_unix(sshd:session): session closed for user core May 13 07:20:41.239000 audit[5144]: USER_END pid=5144 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:41.243282 systemd[1]: sshd@12-172.24.4.235:22-172.24.4.1:41508.service: Deactivated successfully. May 13 07:20:41.243978 systemd[1]: session-13.scope: Deactivated successfully. May 13 07:20:41.258467 systemd-logind[1146]: Session 13 logged out. Waiting for processes to exit. May 13 07:20:41.239000 audit[5144]: CRED_DISP pid=5144 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:41.273626 kernel: audit: type=1106 audit(1747120841.239:1376): pid=5144 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:41.273764 kernel: audit: type=1104 audit(1747120841.239:1377): pid=5144 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:41.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.235:22-172.24.4.1:41508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:41.278473 systemd[1]: Started sshd@13-172.24.4.235:22-172.24.4.1:41518.service. May 13 07:20:41.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.235:22-172.24.4.1:41518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:41.303080 systemd-logind[1146]: Removed session 13. May 13 07:20:42.591000 audit[5157]: USER_ACCT pid=5157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:42.593552 sshd[5157]: Accepted publickey for core from 172.24.4.1 port 41518 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:20:42.596000 audit[5157]: CRED_ACQ pid=5157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:42.597000 audit[5157]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd23f1dfc0 a2=3 a3=0 items=0 ppid=1 pid=5157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:42.597000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:20:42.599706 sshd[5157]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:20:42.615916 systemd-logind[1146]: New session 14 of user core. May 13 07:20:42.616606 systemd[1]: Started session-14.scope. May 13 07:20:42.634000 audit[5157]: USER_START pid=5157 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:42.638000 audit[5159]: CRED_ACQ pid=5159 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:43.837195 sshd[5157]: pam_unix(sshd:session): session closed for user core May 13 07:20:43.838000 audit[5157]: USER_END pid=5157 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:43.838000 audit[5157]: CRED_DISP pid=5157 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:43.842576 systemd[1]: sshd@13-172.24.4.235:22-172.24.4.1:41518.service: Deactivated successfully. May 13 07:20:43.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.235:22-172.24.4.1:41518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:43.843309 systemd[1]: session-14.scope: Deactivated successfully. May 13 07:20:43.843982 systemd-logind[1146]: Session 14 logged out. Waiting for processes to exit. May 13 07:20:43.845214 systemd[1]: Started sshd@14-172.24.4.235:22-172.24.4.1:57660.service. May 13 07:20:43.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.235:22-172.24.4.1:57660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:43.847806 systemd-logind[1146]: Removed session 14. May 13 07:20:45.355503 sshd[5167]: Accepted publickey for core from 172.24.4.1 port 57660 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:20:45.354000 audit[5167]: USER_ACCT pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:45.359454 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 07:20:45.359639 kernel: audit: type=1101 audit(1747120845.354:1389): pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:45.375000 audit[5167]: CRED_ACQ pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:45.378734 sshd[5167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:20:45.392339 kernel: audit: type=1103 audit(1747120845.375:1390): pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:45.402328 kernel: audit: type=1006 audit(1747120845.376:1391): pid=5167 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 13 07:20:45.376000 audit[5167]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e8688e0 a2=3 a3=0 items=0 ppid=1 pid=5167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:45.418347 kernel: audit: type=1300 audit(1747120845.376:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e8688e0 a2=3 a3=0 items=0 ppid=1 pid=5167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:45.414029 systemd-logind[1146]: New session 15 of user core. May 13 07:20:45.415515 systemd[1]: Started session-15.scope. May 13 07:20:45.376000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:20:45.427349 kernel: audit: type=1327 audit(1747120845.376:1391): proctitle=737368643A20636F7265205B707269765D May 13 07:20:45.429000 audit[5167]: USER_START pid=5167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:45.451327 kernel: audit: type=1105 audit(1747120845.429:1392): pid=5167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:45.430000 audit[5169]: CRED_ACQ pid=5169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:45.462393 kernel: audit: type=1103 audit(1747120845.430:1393): pid=5169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:46.226224 sshd[5167]: pam_unix(sshd:session): session closed for user core May 13 07:20:46.228000 audit[5167]: USER_END pid=5167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:46.233411 systemd[1]: sshd@14-172.24.4.235:22-172.24.4.1:57660.service: Deactivated successfully. May 13 07:20:46.237108 systemd[1]: session-15.scope: Deactivated successfully. May 13 07:20:46.247341 kernel: audit: type=1106 audit(1747120846.228:1394): pid=5167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:46.247578 kernel: audit: type=1104 audit(1747120846.228:1395): pid=5167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:46.228000 audit[5167]: CRED_DISP pid=5167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:46.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.235:22-172.24.4.1:57660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:46.263494 systemd-logind[1146]: Session 15 logged out. Waiting for processes to exit. May 13 07:20:46.276534 kernel: audit: type=1131 audit(1747120846.232:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.235:22-172.24.4.1:57660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:46.279460 systemd-logind[1146]: Removed session 15. May 13 07:20:51.239965 systemd[1]: Started sshd@15-172.24.4.235:22-172.24.4.1:57662.service. May 13 07:20:51.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.235:22-172.24.4.1:57662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:51.254334 kernel: audit: type=1130 audit(1747120851.239:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.235:22-172.24.4.1:57662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:52.492000 audit[5184]: USER_ACCT pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:52.494878 sshd[5184]: Accepted publickey for core from 172.24.4.1 port 57662 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:20:52.509581 kernel: audit: type=1101 audit(1747120852.492:1398): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:52.511000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:52.514176 sshd[5184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:20:52.528631 kernel: audit: type=1103 audit(1747120852.511:1399): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:52.539394 kernel: audit: type=1006 audit(1747120852.512:1400): pid=5184 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 07:20:52.512000 audit[5184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1bed7db0 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:52.555359 kernel: audit: type=1300 audit(1747120852.512:1400): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1bed7db0 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:52.512000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:20:52.562419 kernel: audit: type=1327 audit(1747120852.512:1400): proctitle=737368643A20636F7265205B707269765D May 13 07:20:52.564591 systemd-logind[1146]: New session 16 of user core. May 13 07:20:52.566440 systemd[1]: Started session-16.scope. May 13 07:20:52.581000 audit[5184]: USER_START pid=5184 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:52.586000 audit[5186]: CRED_ACQ pid=5186 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:52.602500 kernel: audit: type=1105 audit(1747120852.581:1401): pid=5184 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:52.602547 kernel: audit: type=1103 audit(1747120852.586:1402): pid=5186 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:53.291051 sshd[5184]: pam_unix(sshd:session): session closed for user core May 13 07:20:53.291000 audit[5184]: USER_END pid=5184 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:53.300308 kernel: audit: type=1106 audit(1747120853.291:1403): pid=5184 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:53.291000 audit[5184]: CRED_DISP pid=5184 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:53.302082 systemd[1]: sshd@15-172.24.4.235:22-172.24.4.1:57662.service: Deactivated successfully. May 13 07:20:53.304790 systemd[1]: session-16.scope: Deactivated successfully. May 13 07:20:53.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.235:22-172.24.4.1:57662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:53.306480 kernel: audit: type=1104 audit(1747120853.291:1404): pid=5184 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:53.307500 systemd-logind[1146]: Session 16 logged out. Waiting for processes to exit. May 13 07:20:53.309657 systemd-logind[1146]: Removed session 16. May 13 07:20:53.978143 systemd[1]: run-containerd-runc-k8s.io-ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7-runc.q74fnj.mount: Deactivated successfully. May 13 07:20:58.325014 systemd[1]: Started sshd@16-172.24.4.235:22-172.24.4.1:46710.service. May 13 07:20:58.358816 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 07:20:58.359509 kernel: audit: type=1130 audit(1747120858.326:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.235:22-172.24.4.1:46710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:58.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.235:22-172.24.4.1:46710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:20:59.475000 audit[5235]: USER_ACCT pid=5235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:59.478029 sshd[5235]: Accepted publickey for core from 172.24.4.1 port 46710 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:20:59.491322 kernel: audit: type=1101 audit(1747120859.475:1407): pid=5235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:59.494868 sshd[5235]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:20:59.492000 audit[5235]: CRED_ACQ pid=5235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:59.512981 kernel: audit: type=1103 audit(1747120859.492:1408): pid=5235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:59.513159 kernel: audit: type=1006 audit(1747120859.492:1409): pid=5235 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 13 07:20:59.492000 audit[5235]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0f8a2f0 a2=3 a3=0 items=0 ppid=1 pid=5235 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:59.535597 kernel: audit: type=1300 audit(1747120859.492:1409): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0f8a2f0 a2=3 a3=0 items=0 ppid=1 pid=5235 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:20:59.542343 kernel: audit: type=1327 audit(1747120859.492:1409): proctitle=737368643A20636F7265205B707269765D May 13 07:20:59.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:20:59.548971 systemd-logind[1146]: New session 17 of user core. May 13 07:20:59.550094 systemd[1]: Started session-17.scope. May 13 07:20:59.556000 audit[5235]: USER_START pid=5235 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:59.575289 kernel: audit: type=1105 audit(1747120859.556:1410): pid=5235 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:59.575379 kernel: audit: type=1103 audit(1747120859.563:1411): pid=5237 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:20:59.563000 audit[5237]: CRED_ACQ pid=5237 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:00.349513 sshd[5235]: pam_unix(sshd:session): session closed for user core May 13 07:21:00.351000 audit[5235]: USER_END pid=5235 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:00.369500 kernel: audit: type=1106 audit(1747120860.351:1412): pid=5235 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:00.351000 audit[5235]: CRED_DISP pid=5235 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:00.370079 systemd[1]: sshd@16-172.24.4.235:22-172.24.4.1:46710.service: Deactivated successfully. May 13 07:21:00.373332 systemd[1]: session-17.scope: Deactivated successfully. May 13 07:21:00.384297 kernel: audit: type=1104 audit(1747120860.351:1413): pid=5235 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:00.388572 systemd-logind[1146]: Session 17 logged out. Waiting for processes to exit. May 13 07:21:00.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.235:22-172.24.4.1:46710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:00.391281 systemd-logind[1146]: Removed session 17. May 13 07:21:05.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.235:22-172.24.4.1:35954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:05.363690 systemd[1]: Started sshd@17-172.24.4.235:22-172.24.4.1:35954.service. May 13 07:21:05.370293 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 07:21:05.370466 kernel: audit: type=1130 audit(1747120865.362:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.235:22-172.24.4.1:35954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:06.664000 audit[5249]: USER_ACCT pid=5249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:06.666128 sshd[5249]: Accepted publickey for core from 172.24.4.1 port 35954 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:06.681378 kernel: audit: type=1101 audit(1747120866.664:1416): pid=5249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:06.681556 kernel: audit: type=1103 audit(1747120866.679:1417): pid=5249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:06.679000 audit[5249]: CRED_ACQ pid=5249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:06.684169 sshd[5249]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:06.681000 audit[5249]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d31dcb0 a2=3 a3=0 items=0 ppid=1 pid=5249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:06.719304 kernel: audit: type=1006 audit(1747120866.681:1418): pid=5249 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 13 07:21:06.719530 kernel: audit: type=1300 audit(1747120866.681:1418): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d31dcb0 a2=3 a3=0 items=0 ppid=1 pid=5249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:06.721508 kernel: audit: type=1327 audit(1747120866.681:1418): proctitle=737368643A20636F7265205B707269765D May 13 07:21:06.681000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:06.731724 systemd-logind[1146]: New session 18 of user core. May 13 07:21:06.734486 systemd[1]: Started session-18.scope. May 13 07:21:06.741000 audit[5249]: USER_START pid=5249 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:06.742000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:06.772974 kernel: audit: type=1105 audit(1747120866.741:1419): pid=5249 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:06.773135 kernel: audit: type=1103 audit(1747120866.742:1420): pid=5251 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:07.658079 sshd[5249]: pam_unix(sshd:session): session closed for user core May 13 07:21:07.659000 audit[5249]: USER_END pid=5249 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:07.667791 systemd[1]: sshd@17-172.24.4.235:22-172.24.4.1:35954.service: Deactivated successfully. May 13 07:21:07.678453 kernel: audit: type=1106 audit(1747120867.659:1421): pid=5249 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:07.669486 systemd[1]: session-18.scope: Deactivated successfully. May 13 07:21:07.673763 systemd[1]: Started sshd@18-172.24.4.235:22-172.24.4.1:35964.service. May 13 07:21:07.659000 audit[5249]: CRED_DISP pid=5249 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:07.699470 kernel: audit: type=1104 audit(1747120867.659:1422): pid=5249 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:07.700413 systemd-logind[1146]: Session 18 logged out. Waiting for processes to exit. May 13 07:21:07.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.235:22-172.24.4.1:35954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:07.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.235:22-172.24.4.1:35964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:07.704825 systemd-logind[1146]: Removed session 18. May 13 07:21:08.942000 audit[5260]: USER_ACCT pid=5260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:08.944521 sshd[5260]: Accepted publickey for core from 172.24.4.1 port 35964 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:08.945000 audit[5260]: CRED_ACQ pid=5260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:08.945000 audit[5260]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe610f10b0 a2=3 a3=0 items=0 ppid=1 pid=5260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:08.945000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:08.947564 sshd[5260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:08.958038 systemd-logind[1146]: New session 19 of user core. May 13 07:21:08.960462 systemd[1]: Started session-19.scope. May 13 07:21:08.976000 audit[5260]: USER_START pid=5260 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:08.980000 audit[5262]: CRED_ACQ pid=5262 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:10.126512 sshd[5260]: pam_unix(sshd:session): session closed for user core May 13 07:21:10.129000 audit[5260]: USER_END pid=5260 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:10.130000 audit[5260]: CRED_DISP pid=5260 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:10.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.235:22-172.24.4.1:35966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:10.137962 systemd[1]: Started sshd@19-172.24.4.235:22-172.24.4.1:35966.service. May 13 07:21:10.139762 systemd[1]: sshd@18-172.24.4.235:22-172.24.4.1:35964.service: Deactivated successfully. May 13 07:21:10.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.235:22-172.24.4.1:35964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:10.146156 systemd[1]: session-19.scope: Deactivated successfully. May 13 07:21:10.150077 systemd-logind[1146]: Session 19 logged out. Waiting for processes to exit. May 13 07:21:10.155315 systemd-logind[1146]: Removed session 19. May 13 07:21:11.659000 audit[5269]: USER_ACCT pid=5269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:11.662344 sshd[5269]: Accepted publickey for core from 172.24.4.1 port 35966 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:11.663685 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 07:21:11.663858 kernel: audit: type=1101 audit(1747120871.659:1434): pid=5269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:11.677000 audit[5269]: CRED_ACQ pid=5269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:11.679982 sshd[5269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:11.702286 kernel: audit: type=1103 audit(1747120871.677:1435): pid=5269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:11.677000 audit[5269]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddce72610 a2=3 a3=0 items=0 ppid=1 pid=5269 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:11.727026 kernel: audit: type=1006 audit(1747120871.677:1436): pid=5269 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 13 07:21:11.727229 kernel: audit: type=1300 audit(1747120871.677:1436): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddce72610 a2=3 a3=0 items=0 ppid=1 pid=5269 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:11.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:11.734371 kernel: audit: type=1327 audit(1747120871.677:1436): proctitle=737368643A20636F7265205B707269765D May 13 07:21:11.738121 systemd-logind[1146]: New session 20 of user core. May 13 07:21:11.741492 systemd[1]: Started session-20.scope. May 13 07:21:11.747000 audit[5269]: USER_START pid=5269 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:11.754000 audit[5273]: CRED_ACQ pid=5273 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:11.779096 kernel: audit: type=1105 audit(1747120871.747:1437): pid=5269 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:11.779168 kernel: audit: type=1103 audit(1747120871.754:1438): pid=5273 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:14.803000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.811978 kernel: audit: type=1400 audit(1747120874.803:1439): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.803000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00c0b4090 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:21:14.824541 kernel: audit: type=1300 audit(1747120874.803:1439): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00c0b4090 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:21:14.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:21:14.811000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.831406 kernel: audit: type=1327 audit(1747120874.803:1439): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:21:14.811000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00c134600 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:21:14.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:21:14.816000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.816000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c01223d8c0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:21:14.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:21:14.819000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.819000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00c134690 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:21:14.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:21:14.882000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.882000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0119366f0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:21:14.882000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:21:14.883000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.883000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00bff99e0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:21:14.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:21:14.995000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.995000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002497b00 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:14.995000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:14.996000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:14.996000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00168a510 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:14.996000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:15.137000 audit[5284]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:21:15.137000 audit[5284]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc775b4e30 a2=0 a3=7ffc775b4e1c items=0 ppid=2172 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:15.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:21:15.159000 audit[5284]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:21:15.159000 audit[5284]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc775b4e30 a2=0 a3=7ffc775b4e1c items=0 ppid=2172 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:15.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:21:15.176000 audit[5286]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:21:15.176000 audit[5286]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd3bdc5990 a2=0 a3=7ffd3bdc597c items=0 ppid=2172 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:15.176000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:21:15.182000 audit[5286]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:21:15.182000 audit[5286]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd3bdc5990 a2=0 a3=0 items=0 ppid=2172 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:15.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:21:15.427672 sshd[5269]: pam_unix(sshd:session): session closed for user core May 13 07:21:15.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.235:22-172.24.4.1:38268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:15.432856 systemd[1]: Started sshd@20-172.24.4.235:22-172.24.4.1:38268.service. May 13 07:21:15.454000 audit[5269]: USER_END pid=5269 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:15.454000 audit[5269]: CRED_DISP pid=5269 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:15.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.235:22-172.24.4.1:35966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:15.459198 systemd[1]: sshd@19-172.24.4.235:22-172.24.4.1:35966.service: Deactivated successfully. May 13 07:21:15.461753 systemd[1]: session-20.scope: Deactivated successfully. May 13 07:21:15.470385 systemd-logind[1146]: Session 20 logged out. Waiting for processes to exit. May 13 07:21:15.475141 systemd-logind[1146]: Removed session 20. May 13 07:21:16.919000 audit[5288]: USER_ACCT pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:16.923865 sshd[5288]: Accepted publickey for core from 172.24.4.1 port 38268 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:16.924795 kernel: kauditd_printk_skb: 37 callbacks suppressed May 13 07:21:16.924980 kernel: audit: type=1101 audit(1747120876.919:1455): pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:16.940047 sshd[5288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:16.937000 audit[5288]: CRED_ACQ pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:16.964386 kernel: audit: type=1103 audit(1747120876.937:1456): pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:16.964602 kernel: audit: type=1006 audit(1747120876.937:1457): pid=5288 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 13 07:21:16.937000 audit[5288]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff64ab63d0 a2=3 a3=0 items=0 ppid=1 pid=5288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:16.983439 kernel: audit: type=1300 audit(1747120876.937:1457): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff64ab63d0 a2=3 a3=0 items=0 ppid=1 pid=5288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:16.983610 kernel: audit: type=1327 audit(1747120876.937:1457): proctitle=737368643A20636F7265205B707269765D May 13 07:21:16.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:16.995178 systemd-logind[1146]: New session 21 of user core. May 13 07:21:16.996307 systemd[1]: Started session-21.scope. May 13 07:21:17.010000 audit[5288]: USER_START pid=5288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:17.029765 kernel: audit: type=1105 audit(1747120877.010:1458): pid=5288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:17.030057 kernel: audit: type=1103 audit(1747120877.027:1459): pid=5291 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:17.027000 audit[5291]: CRED_ACQ pid=5291 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:17.991438 sshd[5288]: pam_unix(sshd:session): session closed for user core May 13 07:21:17.993000 audit[5288]: USER_END pid=5288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:18.017361 kernel: audit: type=1106 audit(1747120877.993:1460): pid=5288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:17.998866 systemd[1]: sshd@20-172.24.4.235:22-172.24.4.1:38268.service: Deactivated successfully. May 13 07:21:18.004687 systemd[1]: Started sshd@21-172.24.4.235:22-172.24.4.1:38280.service. May 13 07:21:18.017094 systemd[1]: session-21.scope: Deactivated successfully. May 13 07:21:17.994000 audit[5288]: CRED_DISP pid=5288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:18.040151 systemd-logind[1146]: Session 21 logged out. Waiting for processes to exit. May 13 07:21:18.041031 kernel: audit: type=1104 audit(1747120877.994:1461): pid=5288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:17.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.235:22-172.24.4.1:38268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:18.056514 kernel: audit: type=1131 audit(1747120877.996:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.235:22-172.24.4.1:38268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:18.057594 systemd-logind[1146]: Removed session 21. May 13 07:21:18.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.235:22-172.24.4.1:38280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:19.371000 audit[5299]: USER_ACCT pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:19.373525 sshd[5299]: Accepted publickey for core from 172.24.4.1 port 38280 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:19.375784 sshd[5299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:19.374000 audit[5299]: CRED_ACQ pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:19.374000 audit[5299]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb7b61740 a2=3 a3=0 items=0 ppid=1 pid=5299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:19.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:19.385985 systemd-logind[1146]: New session 22 of user core. May 13 07:21:19.387217 systemd[1]: Started session-22.scope. May 13 07:21:19.393000 audit[5299]: USER_START pid=5299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:19.396000 audit[5303]: CRED_ACQ pid=5303 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:20.342567 sshd[5299]: pam_unix(sshd:session): session closed for user core May 13 07:21:20.342000 audit[5299]: USER_END pid=5299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:20.342000 audit[5299]: CRED_DISP pid=5299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:20.345741 systemd[1]: sshd@21-172.24.4.235:22-172.24.4.1:38280.service: Deactivated successfully. May 13 07:21:20.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.235:22-172.24.4.1:38280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:20.347158 systemd[1]: session-22.scope: Deactivated successfully. May 13 07:21:20.347763 systemd-logind[1146]: Session 22 logged out. Waiting for processes to exit. May 13 07:21:20.350075 systemd-logind[1146]: Removed session 22. May 13 07:21:23.656000 audit[5312]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:21:23.661237 kernel: kauditd_printk_skb: 11 callbacks suppressed May 13 07:21:23.661372 kernel: audit: type=1325 audit(1747120883.656:1472): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:21:23.656000 audit[5312]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffef97f2d80 a2=0 a3=7ffef97f2d6c items=0 ppid=2172 pid=5312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:23.656000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:21:23.683564 kernel: audit: type=1300 audit(1747120883.656:1472): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffef97f2d80 a2=0 a3=7ffef97f2d6c items=0 ppid=2172 pid=5312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:23.683644 kernel: audit: type=1327 audit(1747120883.656:1472): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:21:23.683672 kernel: audit: type=1325 audit(1747120883.672:1473): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:21:23.672000 audit[5312]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 07:21:23.672000 audit[5312]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffef97f2d80 a2=0 a3=7ffef97f2d6c items=0 ppid=2172 pid=5312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:23.695132 kernel: audit: type=1300 audit(1747120883.672:1473): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffef97f2d80 a2=0 a3=7ffef97f2d6c items=0 ppid=2172 pid=5312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:23.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:21:23.700283 kernel: audit: type=1327 audit(1747120883.672:1473): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 07:21:23.910128 systemd[1]: run-containerd-runc-k8s.io-ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7-runc.X16Waw.mount: Deactivated successfully. May 13 07:21:24.404000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:21:24.413272 kernel: audit: type=1400 audit(1747120884.404:1474): avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:21:24.404000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00086f080 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:21:24.428280 kernel: audit: type=1300 audit(1747120884.404:1474): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00086f080 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:21:24.404000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:21:24.441263 kernel: audit: type=1327 audit(1747120884.404:1474): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:21:25.359779 systemd[1]: Started sshd@22-172.24.4.235:22-172.24.4.1:52720.service. May 13 07:21:25.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.235:22-172.24.4.1:52720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:25.379319 kernel: audit: type=1130 audit(1747120885.364:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.235:22-172.24.4.1:52720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:26.663319 sshd[5336]: Accepted publickey for core from 172.24.4.1 port 52720 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:26.661000 audit[5336]: USER_ACCT pid=5336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:26.664000 audit[5336]: CRED_ACQ pid=5336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:26.664000 audit[5336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf6dc2070 a2=3 a3=0 items=0 ppid=1 pid=5336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:26.664000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:26.667867 sshd[5336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:26.681855 systemd-logind[1146]: New session 23 of user core. May 13 07:21:26.683819 systemd[1]: Started session-23.scope. May 13 07:21:26.698000 audit[5336]: USER_START pid=5336 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:26.703000 audit[5338]: CRED_ACQ pid=5338 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:27.310850 sshd[5336]: pam_unix(sshd:session): session closed for user core May 13 07:21:27.312000 audit[5336]: USER_END pid=5336 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:27.313000 audit[5336]: CRED_DISP pid=5336 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:27.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.235:22-172.24.4.1:52720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:27.317935 systemd[1]: sshd@22-172.24.4.235:22-172.24.4.1:52720.service: Deactivated successfully. May 13 07:21:27.318046 systemd-logind[1146]: Session 23 logged out. Waiting for processes to exit. May 13 07:21:27.318765 systemd[1]: session-23.scope: Deactivated successfully. May 13 07:21:27.320363 systemd-logind[1146]: Removed session 23. May 13 07:21:28.170000 audit[4634]: AVC avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:21:28.170000 audit[4634]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00131ee80 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:21:28.170000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:21:30.025803 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 07:21:30.026141 kernel: audit: type=1400 audit(1747120890.019:1485): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:30.019000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:30.038381 kernel: audit: type=1300 audit(1747120890.019:1485): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003127500 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:30.019000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003127500 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:30.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:30.067629 kernel: audit: type=1327 audit(1747120890.019:1485): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:30.067764 kernel: audit: type=1400 audit(1747120890.029:1486): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:30.029000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:30.029000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031c81c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:30.081094 kernel: audit: type=1300 audit(1747120890.029:1486): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031c81c0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:30.081273 kernel: audit: type=1327 audit(1747120890.029:1486): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:30.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:30.087731 kernel: audit: type=1400 audit(1747120890.029:1487): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:30.029000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:30.093589 kernel: audit: type=1300 audit(1747120890.029:1487): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031c81e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:30.029000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031c81e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:30.101301 kernel: audit: type=1327 audit(1747120890.029:1487): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:30.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:30.107699 kernel: audit: type=1400 audit(1747120890.029:1488): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:30.029000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:21:30.029000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031c8200 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:21:30.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:21:32.325880 systemd[1]: Started sshd@23-172.24.4.235:22-172.24.4.1:52730.service. May 13 07:21:32.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.235:22-172.24.4.1:52730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:33.678000 audit[5367]: USER_ACCT pid=5367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:33.680320 sshd[5367]: Accepted publickey for core from 172.24.4.1 port 52730 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:33.680000 audit[5367]: CRED_ACQ pid=5367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:33.680000 audit[5367]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc148b6520 a2=3 a3=0 items=0 ppid=1 pid=5367 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:33.680000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:33.683632 sshd[5367]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:33.698409 systemd-logind[1146]: New session 24 of user core. May 13 07:21:33.699956 systemd[1]: Started session-24.scope. May 13 07:21:33.713000 audit[5367]: USER_START pid=5367 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:33.717000 audit[5371]: CRED_ACQ pid=5371 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:34.450000 audit[5367]: USER_END pid=5367 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:34.450000 audit[5367]: CRED_DISP pid=5367 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:34.450577 sshd[5367]: pam_unix(sshd:session): session closed for user core May 13 07:21:34.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.235:22-172.24.4.1:52730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:34.453920 systemd[1]: sshd@23-172.24.4.235:22-172.24.4.1:52730.service: Deactivated successfully. May 13 07:21:34.454694 systemd[1]: session-24.scope: Deactivated successfully. May 13 07:21:34.456123 systemd-logind[1146]: Session 24 logged out. Waiting for processes to exit. May 13 07:21:34.458343 systemd-logind[1146]: Removed session 24. May 13 07:21:39.463380 systemd[1]: Started sshd@24-172.24.4.235:22-172.24.4.1:57188.service. May 13 07:21:39.486442 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 07:21:39.486616 kernel: audit: type=1130 audit(1747120899.468:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.235:22-172.24.4.1:57188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:39.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.235:22-172.24.4.1:57188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:40.781000 audit[5401]: USER_ACCT pid=5401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:40.786778 sshd[5401]: Accepted publickey for core from 172.24.4.1 port 57188 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:40.798316 kernel: audit: type=1101 audit(1747120900.781:1499): pid=5401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:40.798521 kernel: audit: type=1103 audit(1747120900.796:1500): pid=5401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:40.796000 audit[5401]: CRED_ACQ pid=5401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:40.799934 sshd[5401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:40.797000 audit[5401]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefd8faba0 a2=3 a3=0 items=0 ppid=1 pid=5401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:40.851772 kernel: audit: type=1006 audit(1747120900.797:1501): pid=5401 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 13 07:21:40.851945 kernel: audit: type=1300 audit(1747120900.797:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefd8faba0 a2=3 a3=0 items=0 ppid=1 pid=5401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:40.797000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:40.858317 kernel: audit: type=1327 audit(1747120900.797:1501): proctitle=737368643A20636F7265205B707269765D May 13 07:21:40.865831 systemd-logind[1146]: New session 25 of user core. May 13 07:21:40.868628 systemd[1]: Started session-25.scope. May 13 07:21:40.881000 audit[5401]: USER_START pid=5401 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:40.901310 kernel: audit: type=1105 audit(1747120900.881:1502): pid=5401 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:40.888000 audit[5403]: CRED_ACQ pid=5403 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:40.915310 kernel: audit: type=1103 audit(1747120900.888:1503): pid=5403 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:41.557795 sshd[5401]: pam_unix(sshd:session): session closed for user core May 13 07:21:41.558000 audit[5401]: USER_END pid=5401 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:41.561000 audit[5401]: CRED_DISP pid=5401 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:41.579238 systemd-logind[1146]: Session 25 logged out. Waiting for processes to exit. May 13 07:21:41.580847 systemd[1]: sshd@24-172.24.4.235:22-172.24.4.1:57188.service: Deactivated successfully. May 13 07:21:41.581677 systemd[1]: session-25.scope: Deactivated successfully. May 13 07:21:41.583652 systemd-logind[1146]: Removed session 25. May 13 07:21:41.590534 kernel: audit: type=1106 audit(1747120901.558:1504): pid=5401 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:41.590611 kernel: audit: type=1104 audit(1747120901.561:1505): pid=5401 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:41.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.235:22-172.24.4.1:57188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:46.573071 systemd[1]: Started sshd@25-172.24.4.235:22-172.24.4.1:35332.service. May 13 07:21:46.590644 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 07:21:46.590931 kernel: audit: type=1130 audit(1747120906.572:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.235:22-172.24.4.1:35332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:46.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.235:22-172.24.4.1:35332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:47.732000 audit[5413]: USER_ACCT pid=5413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:47.748991 sshd[5413]: Accepted publickey for core from 172.24.4.1 port 35332 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:47.749775 kernel: audit: type=1101 audit(1747120907.732:1508): pid=5413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:47.747000 audit[5413]: CRED_ACQ pid=5413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:47.750472 sshd[5413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:47.764400 kernel: audit: type=1103 audit(1747120907.747:1509): pid=5413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:47.747000 audit[5413]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe33425b0 a2=3 a3=0 items=0 ppid=1 pid=5413 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:47.789823 kernel: audit: type=1006 audit(1747120907.747:1510): pid=5413 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 13 07:21:47.790022 kernel: audit: type=1300 audit(1747120907.747:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe33425b0 a2=3 a3=0 items=0 ppid=1 pid=5413 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:47.790600 kernel: audit: type=1327 audit(1747120907.747:1510): proctitle=737368643A20636F7265205B707269765D May 13 07:21:47.747000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:47.804786 systemd-logind[1146]: New session 26 of user core. May 13 07:21:47.805619 systemd[1]: Started session-26.scope. May 13 07:21:47.814000 audit[5413]: USER_START pid=5413 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:47.833304 kernel: audit: type=1105 audit(1747120907.814:1511): pid=5413 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:47.832000 audit[5415]: CRED_ACQ pid=5415 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:47.848335 kernel: audit: type=1103 audit(1747120907.832:1512): pid=5415 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:48.558748 sshd[5413]: pam_unix(sshd:session): session closed for user core May 13 07:21:48.563000 audit[5413]: USER_END pid=5413 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:48.582315 kernel: audit: type=1106 audit(1747120908.563:1513): pid=5413 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:48.565000 audit[5413]: CRED_DISP pid=5413 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:48.586779 systemd-logind[1146]: Session 26 logged out. Waiting for processes to exit. May 13 07:21:48.594639 systemd[1]: sshd@25-172.24.4.235:22-172.24.4.1:35332.service: Deactivated successfully. May 13 07:21:48.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.235:22-172.24.4.1:35332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:48.599416 kernel: audit: type=1104 audit(1747120908.565:1514): pid=5413 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:48.601127 systemd[1]: session-26.scope: Deactivated successfully. May 13 07:21:48.609003 systemd-logind[1146]: Removed session 26. May 13 07:21:53.577076 systemd[1]: Started sshd@26-172.24.4.235:22-172.24.4.1:46114.service. May 13 07:21:53.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.235:22-172.24.4.1:46114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:53.585814 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 07:21:53.586110 kernel: audit: type=1130 audit(1747120913.577:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.235:22-172.24.4.1:46114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:54.776000 audit[5425]: USER_ACCT pid=5425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:54.782435 sshd[5425]: Accepted publickey for core from 172.24.4.1 port 46114 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 07:21:54.779000 audit[5425]: CRED_ACQ pid=5425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:54.807353 sshd[5425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 07:21:54.823942 kernel: audit: type=1101 audit(1747120914.776:1517): pid=5425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:54.824191 kernel: audit: type=1103 audit(1747120914.779:1518): pid=5425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:54.835340 kernel: audit: type=1006 audit(1747120914.779:1519): pid=5425 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 13 07:21:54.779000 audit[5425]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbf8a670 a2=3 a3=0 items=0 ppid=1 pid=5425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:54.850324 kernel: audit: type=1300 audit(1747120914.779:1519): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbf8a670 a2=3 a3=0 items=0 ppid=1 pid=5425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 07:21:54.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 07:21:54.853909 systemd[1]: Started session-27.scope. May 13 07:21:54.857325 kernel: audit: type=1327 audit(1747120914.779:1519): proctitle=737368643A20636F7265205B707269765D May 13 07:21:54.854353 systemd-logind[1146]: New session 27 of user core. May 13 07:21:54.862000 audit[5425]: USER_START pid=5425 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:54.872434 kernel: audit: type=1105 audit(1747120914.862:1520): pid=5425 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:54.872638 kernel: audit: type=1103 audit(1747120914.870:1521): pid=5453 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:54.870000 audit[5453]: CRED_ACQ pid=5453 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:55.558710 sshd[5425]: pam_unix(sshd:session): session closed for user core May 13 07:21:55.561000 audit[5425]: USER_END pid=5425 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:55.570317 kernel: audit: type=1106 audit(1747120915.561:1522): pid=5425 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:55.570548 systemd[1]: sshd@26-172.24.4.235:22-172.24.4.1:46114.service: Deactivated successfully. May 13 07:21:55.571468 systemd[1]: session-27.scope: Deactivated successfully. May 13 07:21:55.562000 audit[5425]: CRED_DISP pid=5425 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:55.572761 systemd-logind[1146]: Session 27 logged out. Waiting for processes to exit. May 13 07:21:55.573821 systemd-logind[1146]: Removed session 27. May 13 07:21:55.585306 kernel: audit: type=1104 audit(1747120915.562:1523): pid=5425 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 07:21:55.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.235:22-172.24.4.1:46114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:21:57.038569 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.cO4mOK.mount: Deactivated successfully. May 13 07:22:14.804000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.809950 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 07:22:14.810177 kernel: audit: type=1400 audit(1747120934.804:1525): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.804000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010bb5410 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.848516 kernel: audit: type=1300 audit(1747120934.804:1525): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010bb5410 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.848785 kernel: audit: type=1327 audit(1747120934.804:1525): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.867325 kernel: audit: type=1400 audit(1747120934.812:1526): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.812000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.812000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010bb5440 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.893594 kernel: audit: type=1300 audit(1747120934.812:1526): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010bb5440 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.893822 kernel: audit: type=1327 audit(1747120934.812:1526): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.901117 kernel: audit: type=1400 audit(1747120934.817:1527): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.817000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.817000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c006d2ca00 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.914792 kernel: audit: type=1300 audit(1747120934.817:1527): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c006d2ca00 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.915078 kernel: audit: type=1327 audit(1747120934.817:1527): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.819000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.819000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012269aa0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.931561 kernel: audit: type=1400 audit(1747120934.819:1528): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.884000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.884000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c006d2ca20 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.884000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.885000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.885000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012269b30 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:22:14.885000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:22:14.997000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.997000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0033e5ec0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:14.997000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:14.999000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:14.999000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002e0e10 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:14.999000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:15.212309 update_engine[1147]: I0513 07:22:15.211853 1147 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 13 07:22:15.212309 update_engine[1147]: I0513 07:22:15.212041 1147 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 13 07:22:15.216978 update_engine[1147]: I0513 07:22:15.216377 1147 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 13 07:22:15.219972 update_engine[1147]: I0513 07:22:15.219810 1147 omaha_request_params.cc:62] Current group set to lts May 13 07:22:15.224003 update_engine[1147]: I0513 07:22:15.223968 1147 update_attempter.cc:499] Already updated boot flags. Skipping. May 13 07:22:15.224218 update_engine[1147]: I0513 07:22:15.224189 1147 update_attempter.cc:643] Scheduling an action processor start. May 13 07:22:15.224574 update_engine[1147]: I0513 07:22:15.224536 1147 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 13 07:22:15.225026 update_engine[1147]: I0513 07:22:15.224968 1147 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 13 07:22:15.225617 locksmithd[1187]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 13 07:22:15.226381 update_engine[1147]: I0513 07:22:15.225497 1147 omaha_request_action.cc:270] Posting an Omaha request to disabled May 13 07:22:15.226381 update_engine[1147]: I0513 07:22:15.225522 1147 omaha_request_action.cc:271] Request: May 13 07:22:15.226381 update_engine[1147]: May 13 07:22:15.226381 update_engine[1147]: May 13 07:22:15.226381 update_engine[1147]: May 13 07:22:15.226381 update_engine[1147]: May 13 07:22:15.226381 update_engine[1147]: May 13 07:22:15.226381 update_engine[1147]: May 13 07:22:15.226381 update_engine[1147]: May 13 07:22:15.226381 update_engine[1147]: May 13 07:22:15.227457 update_engine[1147]: I0513 07:22:15.225534 1147 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 07:22:15.235994 update_engine[1147]: I0513 07:22:15.235954 1147 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 07:22:15.238209 update_engine[1147]: E0513 07:22:15.238173 1147 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 07:22:15.238661 update_engine[1147]: I0513 07:22:15.238624 1147 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 13 07:22:23.945078 systemd[1]: run-containerd-runc-k8s.io-ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7-runc.G5eUbD.mount: Deactivated successfully. May 13 07:22:24.408000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:22:24.409767 kernel: kauditd_printk_skb: 14 callbacks suppressed May 13 07:22:24.409886 kernel: audit: type=1400 audit(1747120944.408:1533): avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:22:24.408000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00256c160 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:22:24.408000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:22:24.463627 kernel: audit: type=1300 audit(1747120944.408:1533): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00256c160 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:22:24.463840 kernel: audit: type=1327 audit(1747120944.408:1533): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:22:25.205402 update_engine[1147]: I0513 07:22:25.204974 1147 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 07:22:25.206338 update_engine[1147]: I0513 07:22:25.205529 1147 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 07:22:25.206338 update_engine[1147]: E0513 07:22:25.205716 1147 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 07:22:25.206338 update_engine[1147]: I0513 07:22:25.205966 1147 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 13 07:22:28.174000 audit[4634]: AVC avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:22:28.174000 audit[4634]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001d3c500 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:22:28.212046 kernel: audit: type=1400 audit(1747120948.174:1534): avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:22:28.212580 kernel: audit: type=1300 audit(1747120948.174:1534): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001d3c500 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:22:28.212879 kernel: audit: type=1327 audit(1747120948.174:1534): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:22:28.174000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:22:30.024000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:30.049342 kernel: audit: type=1400 audit(1747120950.024:1535): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:30.024000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002aad9e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:30.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:30.085487 kernel: audit: type=1300 audit(1747120950.024:1535): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002aad9e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:30.085700 kernel: audit: type=1327 audit(1747120950.024:1535): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:30.085858 kernel: audit: type=1400 audit(1747120950.030:1536): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:30.030000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:30.030000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00345b040 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:30.108199 kernel: audit: type=1300 audit(1747120950.030:1536): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00345b040 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:30.108408 kernel: audit: type=1327 audit(1747120950.030:1536): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:30.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:30.030000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:30.120787 kernel: audit: type=1400 audit(1747120950.030:1537): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:30.120960 kernel: audit: type=1300 audit(1747120950.030:1537): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00345b060 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:30.030000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00345b060 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:30.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:30.135001 kernel: audit: type=1327 audit(1747120950.030:1537): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:30.135170 kernel: audit: type=1400 audit(1747120950.030:1538): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:30.030000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:22:30.030000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00345b080 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:22:30.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:22:35.206396 update_engine[1147]: I0513 07:22:35.205739 1147 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 07:22:35.206396 update_engine[1147]: I0513 07:22:35.206166 1147 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 07:22:35.207172 update_engine[1147]: E0513 07:22:35.206456 1147 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 07:22:35.207172 update_engine[1147]: I0513 07:22:35.206611 1147 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 13 07:22:45.205375 update_engine[1147]: I0513 07:22:45.205106 1147 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 07:22:45.206144 update_engine[1147]: I0513 07:22:45.205564 1147 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 07:22:45.206144 update_engine[1147]: E0513 07:22:45.205745 1147 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 07:22:45.206144 update_engine[1147]: I0513 07:22:45.205880 1147 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 13 07:22:45.206144 update_engine[1147]: I0513 07:22:45.205895 1147 omaha_request_action.cc:621] Omaha request response: May 13 07:22:45.206144 update_engine[1147]: E0513 07:22:45.206108 1147 omaha_request_action.cc:640] Omaha request network transfer failed. May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206166 1147 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206177 1147 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206187 1147 update_attempter.cc:306] Processing Done. May 13 07:22:45.206773 update_engine[1147]: E0513 07:22:45.206207 1147 update_attempter.cc:619] Update failed. May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206231 1147 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206241 1147 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206311 1147 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206485 1147 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206527 1147 omaha_request_action.cc:270] Posting an Omaha request to disabled May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206537 1147 omaha_request_action.cc:271] Request: May 13 07:22:45.206773 update_engine[1147]: May 13 07:22:45.206773 update_engine[1147]: May 13 07:22:45.206773 update_engine[1147]: May 13 07:22:45.206773 update_engine[1147]: May 13 07:22:45.206773 update_engine[1147]: May 13 07:22:45.206773 update_engine[1147]: May 13 07:22:45.206773 update_engine[1147]: I0513 07:22:45.206545 1147 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 07:22:45.209053 update_engine[1147]: I0513 07:22:45.206854 1147 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 07:22:45.209053 update_engine[1147]: E0513 07:22:45.207005 1147 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 07:22:45.209053 update_engine[1147]: I0513 07:22:45.207134 1147 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 13 07:22:45.209053 update_engine[1147]: I0513 07:22:45.207149 1147 omaha_request_action.cc:621] Omaha request response: May 13 07:22:45.209053 update_engine[1147]: I0513 07:22:45.207165 1147 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 13 07:22:45.209053 update_engine[1147]: I0513 07:22:45.207176 1147 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 13 07:22:45.209053 update_engine[1147]: I0513 07:22:45.207190 1147 update_attempter.cc:306] Processing Done. May 13 07:22:45.209053 update_engine[1147]: I0513 07:22:45.207197 1147 update_attempter.cc:310] Error event sent. May 13 07:22:45.209053 update_engine[1147]: I0513 07:22:45.207242 1147 update_check_scheduler.cc:74] Next update check in 42m54s May 13 07:22:45.210023 locksmithd[1187]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 13 07:22:45.210023 locksmithd[1187]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 13 07:23:14.808000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.812767 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 07:23:14.812997 kernel: audit: type=1400 audit(1747120994.808:1539): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.808000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c007cd3bf0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.844820 kernel: audit: type=1300 audit(1747120994.808:1539): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c007cd3bf0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.844999 kernel: audit: type=1327 audit(1747120994.808:1539): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:14.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:14.812000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.875076 kernel: audit: type=1400 audit(1747120994.812:1540): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.875312 kernel: audit: type=1300 audit(1747120994.812:1540): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008315530 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.812000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008315530 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.890327 kernel: audit: type=1327 audit(1747120994.812:1540): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:14.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:14.896633 kernel: audit: type=1400 audit(1747120994.818:1541): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.818000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.902128 kernel: audit: type=1300 audit(1747120994.818:1541): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c011f7c640 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.818000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c011f7c640 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.909651 kernel: audit: type=1327 audit(1747120994.818:1541): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:14.818000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:14.919783 kernel: audit: type=1400 audit(1747120994.823:1542): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.823000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.823000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c007cd3c80 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.823000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:14.885000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.885000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0118f9de0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.885000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:14.885000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:14.885000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0083155c0 a2=fc6 a3=0 items=0 ppid=1739 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c1018 key=(null) May 13 07:23:14.885000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323335002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 13 07:23:15.002000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:15.002000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000feb0a0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:15.002000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:23:15.002000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:15.002000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cdd650 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:15.002000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:23:23.934489 systemd[1]: run-containerd-runc-k8s.io-ec7734ae8d14f26efe15a39fe23d27f914860ed822fb2e2c14248effe6f06ea7-runc.j9rba2.mount: Deactivated successfully. May 13 07:23:24.412000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:23:24.416625 kernel: kauditd_printk_skb: 14 callbacks suppressed May 13 07:23:24.416768 kernel: audit: type=1400 audit(1747121004.412:1547): avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.233508453/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c100,c779 tclass=file permissive=0 May 13 07:23:24.412000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00256cf20 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:23:24.452802 kernel: audit: type=1300 audit(1747121004.412:1547): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00256cf20 a2=fc6 a3=0 items=0 ppid=3795 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c100,c779 key=(null) May 13 07:23:24.412000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:23:24.470435 kernel: audit: type=1327 audit(1747121004.412:1547): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:23:27.029557 systemd[1]: run-containerd-runc-k8s.io-50f487b4d6b5600416a41f5d1292005f346336a10178dda79ced447a2989602f-runc.OPSvy7.mount: Deactivated successfully. May 13 07:23:28.176000 audit[4634]: AVC avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:23:28.193342 kernel: audit: type=1400 audit(1747121008.176:1548): avc: denied { watch } for pid=4634 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_07_16_56.3875453543/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c109,c406 tclass=file permissive=0 May 13 07:23:28.193589 kernel: audit: type=1300 audit(1747121008.176:1548): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001d3dfc0 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:23:28.176000 audit[4634]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001d3dfc0 a2=fc6 a3=0 items=0 ppid=3989 pid=4634 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c109,c406 key=(null) May 13 07:23:28.176000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:23:28.228780 kernel: audit: type=1327 audit(1747121008.176:1548): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:23:30.029000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:30.060298 kernel: audit: type=1400 audit(1747121010.029:1549): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:30.029000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af5780 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:30.073317 kernel: audit: type=1300 audit(1747121010.029:1549): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af5780 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:30.073515 kernel: audit: type=1327 audit(1747121010.029:1549): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:23:30.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:23:30.029000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:30.029000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af57e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:30.115431 kernel: audit: type=1400 audit(1747121010.029:1550): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:30.115610 kernel: audit: type=1300 audit(1747121010.029:1550): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af57e0 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:30.115742 kernel: audit: type=1327 audit(1747121010.029:1550): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:23:30.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:23:30.029000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:30.129655 kernel: audit: type=1400 audit(1747121010.029:1551): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:30.129846 kernel: audit: type=1300 audit(1747121010.029:1551): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af5980 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:30.029000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af5980 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:30.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:23:30.145936 kernel: audit: type=1327 audit(1747121010.029:1551): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:23:30.146220 kernel: audit: type=1400 audit(1747121010.051:1552): avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:30.051000 audit[1901]: AVC avc: denied { watch } for pid=1901 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:23:30.051000 audit[1901]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af5b20 a2=fc6 a3=0 items=0 ppid=1759 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c831 key=(null) May 13 07:23:30.051000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269